URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Submission: On September 06 via api from US

Summary

This website contacted 16 IPs in 4 countries across 14 domains to perform 46 HTTP transactions. The main IP is 143.204.214.87, located in Seattle, United States and belongs to AMAZON-02 - Amazon.com, Inc., US. The main domain is blog.rapid7.com.
TLS certificate: Issued by Amazon on July 3rd 2019. Valid for: a year.
This is the only time blog.rapid7.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
17 143.204.214.87 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 2 143.204.212.111 16509 (AMAZON-02)
4 13.32.145.141 16509 (AMAZON-02)
1 151.139.237.11 33438 (HIGHWINDS2)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 151.101.113.181 54113 (FASTLY)
6 2a00:1450:400... 15169 (GOOGLE)
1 151.101.112.134 54113 (FASTLY)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 2a04:4e42:1b:... 54113 (FASTLY)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 151.101.192.134 54113 (FASTLY)
2 2606:4700::68... 13335 (CLOUDFLAR...)
46 16
Domain Requested by
17 blog.rapid7.com blog.rapid7.com
www.rapid7.com
6 fonts.gstatic.com blog.rapid7.com
4 www.rapid7.com blog.rapid7.com
2 c.disquscdn.com rapid7.disqus.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 fonts.googleapis.com blog.rapid7.com
2 rapid7.com 2 redirects
1 disqus.com rapid7.disqus.com
1 www.google.de blog.rapid7.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 cdn.jsdelivr.net cdn.rawgit.com
1 geoip-js.maxmind.com js.maxmind.com
1 play.vidyard.com blog.rapid7.com
1 www.googletagmanager.com blog.rapid7.com
1 cdn.rawgit.com blog.rapid7.com
1 rapid7.disqus.com blog.rapid7.com
1 js.maxmind.com blog.rapid7.com
46 18
Subject Issuer Validity Valid
blog.rapid7.com
Amazon
2019-07-03 -
2020-08-03
a year crt.sh
*.maxmind.com
COMODO RSA Organization Validation Secure Server CA
2018-10-15 -
2020-11-06
2 years crt.sh
rapid7.com
Amazon
2019-01-18 -
2020-02-18
a year crt.sh
rawgit.com
COMODO RSA Domain Validation Secure Server CA
2018-12-29 -
2020-01-13
a year crt.sh
*.googleapis.com
GTS CA 1O1
2019-08-23 -
2019-11-21
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2019-08-23 -
2019-11-21
3 months crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-09-03 -
2021-02-22
a year crt.sh
*.google.com
GTS CA 1O1
2019-08-23 -
2019-11-21
3 months crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
f3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-05-29 -
2020-04-23
a year crt.sh
www.google.de
GTS CA 1O1
2019-08-23 -
2019-11-21
3 months crt.sh
ssl565697.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-25 -
2020-03-02
6 months crt.sh

This page contains 5 frames:

Primary Page: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Frame ID: 4A1FE1181CD32CDAB74CDCB379049BFE
Requests: 42 HTTP requests in this frame

Frame: https://play.vidyard.com/fx67kMSZkDNhEN6xy1zV3x.html?v=3.1.1
Frame ID: 6274E04EEBC25DA09783EC34B57271FE
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=rapid7&t_i=5d72600469380c18ceb5518c&t_u=https%3A%2F%2Fblog.rapid7.com%2F2019%2F09%2F06%2Finitial-metasploit-exploit-module-for-bluekeep-cve-2019-0708%2F&t_d=Initial%20Metasploit%20Exploit%20Module%20for%20BlueKeep%20(CVE-2019-0708)&t_t=Initial%20Metasploit%20Exploit%20Module%20for%20BlueKeep%20(CVE-2019-0708)&s_o=default
Frame ID: CF5C3B74A66BC395A62C388E66CC0B87
Requests: 1 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Frame ID: A4AA71CE4882412F09F6AF784A56863A
Requests: 1 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Frame ID: C72D80DF31A201FD9AC46C302103DC7E
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • meta generator /Ghost(?:\s([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • meta generator /Ghost(?:\s([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /googletagmanager\.com\/ns\.html[^>]+><\/iframe>/i
  • html /<!-- (?:End )?Google Tag Manager -->/i

Page Statistics

46
Requests

89 %
HTTPS

61 %
IPv6

14
Domains

18
Subdomains

16
IPs

4
Countries

588 kB
Transfer

1221 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 4
  • https://rapid7.com/includes/js/populateCountryState.js HTTP 301
  • https://www.rapid7.com/includes/js/populateCountryState.js
Request Chain 9
  • https://rapid7.com/globalassets/_images/blog-author-images/author-icon-25170.png HTTP 301
  • https://www.rapid7.com/globalassets/_images/blog-author-images/author-icon-25170.png
Request Chain 37
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=2007984622&t=pageview&_s=1&dl=https%3A%2F%2Fblog.rapid7.com%2F2019%2F09%2F06%2Finitial-metasploit-exploit-module-for-bluekeep-cve-2019-0708%2F&ul=en-us&de=UTF-8&dt=Initial%20Metasploit%20Exploit%20Module%20for%20BlueKeep%20(CVE-2019-0708)&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YEBAAEAB~&jid=940579174&gjid=470444967&cid=1921614652.1567795224&tid=UA-4622520-1&_gid=1924609661.1567795224&_r=1&gtm=2wg8l2WBTPTVC&cd15=contact&z=272239118 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_gid=1924609661.1567795224&gjid=470444967&_v=j79&z=272239118 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_v=j79&z=272239118 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_v=j79&z=272239118&slf_rd=1&random=2848575663

46 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
34 KB
10 KB
Document
General
Full URL
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
dd3ecbdcc5b76814c100918e4d8ccb06b80ca8fbb7be55b7750feadf7963134c
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Host
blog.rapid7.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Content-Type
text/html; charset=utf-8
Content-Length
9357
Connection
keep-alive
Cache-Control
public, max-age=0
Content-Encoding
gzip
Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Date
Fri, 06 Sep 2019 16:13:33 GMT
ETag
W/"88e7-ujZzTuBYDiGOWZ0YNlAakEDF3ns"
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
X-Powered-By
Express
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 16dc09493f48bbc1fd2cdd6e175a94f7.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
_IpXlEsPkg4QZT6BK1JD6Kwduyxx7-zbSWPP8gogJqzQHSZYxofX5g==
style.css
blog.rapid7.com/assets/css/
142 KB
24 KB
Stylesheet
General
Full URL
https://blog.rapid7.com/assets/css/style.css?v=ac87d9de3b
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
f2fb747918d739df6ed0847a1a1ae2ccde162a54559a13d1c80a9703dc25ce70
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Content-Encoding
gzip
ETag
W/"238f8-16c687214f0"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
23488
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Fri, 06 Sep 2019 18:40:23 GMT
Vary
Accept-Encoding
Content-Type
text/css; charset=UTF-8
Via
1.1 16dc09493f48bbc1fd2cdd6e175a94f7.cloudfront.net (CloudFront)
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
sDtnK1SaRrHB8rKWDNxuEtJSyP6rB-aI-gcBf_AxJqSEVXGRpyGvkQ==
annimate.min.css
blog.rapid7.com/assets/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://blog.rapid7.com/assets/css/annimate.min.css?v=ac87d9de3b
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
0add8fcb5a583b1c16238fbe9d0de17c6272726b42be17fdcd9b4686ef5287d1
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Content-Encoding
gzip
ETag
W/"4238-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
2621
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Fri, 06 Sep 2019 08:28:06 GMT
Vary
Accept-Encoding
Content-Type
text/css; charset=UTF-8
Via
1.1 16dc09493f48bbc1fd2cdd6e175a94f7.cloudfront.net (CloudFront)
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
QKOcIW9u51c0pM1ZgsbZceh9NzLyEdGwugjIkOMFlTw4kigB-rndaQ==
prettycode-min.css
blog.rapid7.com/assets/css/
763 B
1 KB
Stylesheet
General
Full URL
https://blog.rapid7.com/assets/css/prettycode-min.css?v=ac87d9de3b
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
efbafc7f087240a453c21be238748d4167b01bc635e5cefefe6e041f3bb42284
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 12c16baed6578bf50fb0eaa233f2bc84.cloudfront.net (CloudFront)
ETag
W/"2fb-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
763
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
Date
Fri, 06 Sep 2019 08:28:06 GMT
X-Frame-Options
SAMEORIGIN
Content-Type
text/css; charset=UTF-8
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
6W7QIZMNdhgI_m9kzpaT_Odz9uQIPSEUMiGWPvecQG3dttJqmcEQ_g==
geoip2.js
js.maxmind.com/js/apis/geoip2/v2.1/
4 KB
2 KB
Script
General
Full URL
https://js.maxmind.com/js/apis/geoip2/v2.1/geoip2.js
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:262f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
69666124ea4313cf5b2da94871c86acd68bcbc4d50b360fdebc4dc3b977dde21

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 06 Sep 2019 18:40:23 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Thu, 05 Sep 2019 18:01:14 GMT
server
cloudflare
age
882
etag
W/"5d714d6a-f39"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=43200
cf-ray
512292344b0acb98-VIE
expires
Sat, 07 Sep 2019 06:40:23 GMT
populateCountryState.js
www.rapid7.com/includes/js/
Redirect Chain
  • https://rapid7.com/includes/js/populateCountryState.js
  • https://www.rapid7.com/includes/js/populateCountryState.js
6 KB
2 KB
Script
General
Full URL
https://www.rapid7.com/includes/js/populateCountryState.js
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.32.145.141 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-32-145-141.fra56.r.cloudfront.net
Software
Microsoft-IIS/8.5 /
Resource Hash
948ef5fb4409b53579bee0c26ee642ed9fbc77f0e279d5aed6b8cfdff8f3182a
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
X-Content-Type-Options nosniff
X-Frame-Options ALLOW-FROM https://content.rapid7.com
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
8
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-XSS-Protection
1; mode=block
Last-Modified
Tue, 03 Sep 2019 15:12:03 GMT
Server
Microsoft-IIS/8.5
X-Frame-Options
ALLOW-FROM https://content.rapid7.com
Date
Fri, 06 Sep 2019 18:40:03 GMT
Vary
Accept-Encoding
Content-Type
application/javascript
Via
1.1 7483360604f484b4fd54bffc9e822f46.cloudfront.net (CloudFront)
Cache-Control
no-cache
X-Amz-Cf-Pop
FRA56
X-Amz-Cf-Id
srKsYKFYwnCDtRa4FPGGXYvkEk4_afD1UyMLJQfmHUiKmxYzdA9VRA==

Redirect headers

Content-Security-Policy
frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
Via
1.1 3f6fbf009bb5cf969f92ba2e59576614.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Server
Microsoft-IIS/8.5
Age
12720
Date
Fri, 06 Sep 2019 15:08:11 GMT
X-Frame-Options
ALLOW-FROM https://content.rapid7.com
X-Cache
Hit from cloudfront
Content-Type
text/html; charset=UTF-8
Location
https://www.rapid7.com/includes/js/populateCountryState.js
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
181
X-XSS-Protection
1; mode=block
X-Amz-Cf-Id
T8mGUiz62ko3HkLdttBGa_ftSw4kbmNVhs-I0bY6INVpwmCk2GaivQ==
ghost-sdk.min.js
blog.rapid7.com/public/
764 B
1 KB
Script
General
Full URL
https://blog.rapid7.com/public/ghost-sdk.min.js?v=ac87d9de3b
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
8d726e3450dc7d6ab092ad5d61c034403bf7e9963481a3a7c7eec63fcb101b86
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 850ccace60916919bf31313cb9176e01.cloudfront.net (CloudFront)
ETag
"b33800c57095295d304f6865c1b9cffa"
Server
nginx/1.10.3 (Ubuntu)
X-Amz-Cf-Pop
FRA53-C1
X-Frame-Options
SAMEORIGIN
X-Powered-By
Express
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Cache-Control
public, max-age=31536000
Date
Fri, 06 Sep 2019 17:43:09 GMT
Connection
keep-alive
Content-Length
764
X-Amz-Cf-Id
gyzDV-kY8gW2wxzqYTE13GNiIKqC5JwF3rd-baBbGWHvZezN3oVpDA==
close-white.svg
blog.rapid7.com/assets/images/
902 B
2 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/close-white.svg?v=ac87d9de3b
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
c3c69959748dc65a14bd0c7963302292aa0e0b1568e142dab251ca90df3e533c
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 c714e4f593454d65f62cf3fecf756a4c.cloudfront.net (CloudFront)
ETag
W/"386-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Miss from cloudfront
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
902
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
Date
Fri, 06 Sep 2019 18:40:24 GMT
X-Frame-Options
SAMEORIGIN
Content-Type
image/svg+xml
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
sAvNiXYshK8N8b-3H9J5XqzzfvbQpxcp_hoqdTSdkdFRru9jGAtS0w==
Rapid7_logo.svg
www.rapid7.com/includes/img/
1 KB
1 KB
Image
General
Full URL
https://www.rapid7.com/includes/img/Rapid7_logo.svg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.32.145.141 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-32-145-141.fra56.r.cloudfront.net
Software
Microsoft-IIS/8.5 /
Resource Hash
645974ab1d8d0e3c1d0521ec026f9076212bf7805122a119768fa601b8df0fc8
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
X-Content-Type-Options nosniff
X-Frame-Options ALLOW-FROM https://content.rapid7.com
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
8
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-XSS-Protection
1; mode=block
Last-Modified
Tue, 03 Sep 2019 15:16:11 GMT
Server
Microsoft-IIS/8.5
X-Frame-Options
ALLOW-FROM https://content.rapid7.com
Date
Fri, 06 Sep 2019 18:40:00 GMT
Vary
Accept-Encoding
Content-Type
image/svg+xml
Via
1.1 7483360604f484b4fd54bffc9e822f46.cloudfront.net (CloudFront)
Cache-Control
no-cache
X-Amz-Cf-Pop
FRA56
X-Amz-Cf-Id
dGKr7olD0MNO-IDr_0gBVREfHLImfwU0Bi95S2I6BdsX6sJ5nF2rNw==
search.svg
blog.rapid7.com/assets/images/
2 KB
1 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/search.svg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
a9e55798099dd6926b2c7707be427682e3b64fbd38a0fc407b1d46ebf0d57034
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Content-Encoding
gzip
ETag
W/"637-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
736
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Fri, 06 Sep 2019 18:40:23 GMT
Vary
Accept-Encoding
Content-Type
image/svg+xml
Via
1.1 850ccace60916919bf31313cb9176e01.cloudfront.net (CloudFront)
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
8FZo1jnCU0KtwD4P8L44jNxr0R8FXHOz2QjIFz1HbX7mnqqmd_dEfQ==
author-icon-25170.png
www.rapid7.com/globalassets/_images/blog-author-images/
Redirect Chain
  • https://rapid7.com/globalassets/_images/blog-author-images/author-icon-25170.png
  • https://www.rapid7.com/globalassets/_images/blog-author-images/author-icon-25170.png
41 KB
42 KB
Image
General
Full URL
https://www.rapid7.com/globalassets/_images/blog-author-images/author-icon-25170.png
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.32.145.141 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-32-145-141.fra56.r.cloudfront.net
Software
Microsoft-IIS/8.5 /
Resource Hash
78302409c7697878058273d7a9767412befb95fa0f65bbbf2a39aa6d5022c636
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
X-Content-Type-Options nosniff
X-Frame-Options ALLOW-FROM https://content.rapid7.com
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
Via
1.1 7483360604f484b4fd54bffc9e822f46.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Age
6446
X-Cache
Hit from cloudfront
Date
Thu, 05 Sep 2019 22:59:20 GMT
Connection
keep-alive
Content-Length
42018
X-XSS-Protection
1; mode=block
Last-Modified
Wed, 21 Jun 2017 23:15:14 GMT
Server
Microsoft-IIS/8.5
ETag
"1D2EAE43D541790"
X-Frame-Options
ALLOW-FROM https://content.rapid7.com
Content-Type
image/png
Cache-Control
public
X-Amz-Cf-Pop
FRA56
X-Amz-Cf-Id
TBOtDVFE49c0IlugjA6jFPC0UV4Na6M6d6RiC4CoBFhJgF63mMt81Q==
Expires
Fri, 06 Sep 2019 10:59:20 GMT

Redirect headers

Content-Security-Policy
frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
Via
1.1 3f6fbf009bb5cf969f92ba2e59576614.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Server
Microsoft-IIS/8.5
Age
9405
Date
Fri, 06 Sep 2019 16:03:24 GMT
X-Frame-Options
ALLOW-FROM https://content.rapid7.com
X-Cache
Hit from cloudfront
Content-Type
text/html; charset=UTF-8
Location
https://www.rapid7.com/globalassets/_images/blog-author-images/author-icon-25170.png
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
207
X-XSS-Protection
1; mode=block
X-Amz-Cf-Id
1LOwMxyGVap4vyuj0hHROaG2_NDcG9E3Q2y2a3NZjWUa9mq6ThEp9A==
linkedin.svg
blog.rapid7.com/assets/images/
1020 B
2 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/linkedin.svg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
a215f76bfdc690d1849d2b5d9ed15cefdd84b2f8172c201f94a49622a42691cd
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 12c16baed6578bf50fb0eaa233f2bc84.cloudfront.net (CloudFront)
ETag
W/"3fc-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
1020
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Fri, 06 Sep 2019 18:40:23 GMT
Vary
Accept-Encoding
Content-Type
image/svg+xml
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
Ax9h4_zuEVuijmxcs3xPu-9lSs4mGuVVbY5uIxP8wBZ-R03unZJmYQ==
twitter.svg
blog.rapid7.com/assets/images/
2 KB
2 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/twitter.svg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
3c7503d4783e40ec7780234d40694379e2c197392aa7e8530837d825cd8c6b9e
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Content-Encoding
gzip
ETag
W/"821-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
1006
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Sun, 01 Sep 2019 21:31:58 GMT
Vary
Accept-Encoding
Content-Type
image/svg+xml
Via
1.1 9d27077cd67d98c0474b05ec9d68df4a.cloudfront.net (CloudFront)
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
xJpW1aFymja4za4LZxiifrF0PC0QsLIyydu883jKZr50uXAn8x1aOQ==
facebook.svg
blog.rapid7.com/assets/images/
804 B
1 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/facebook.svg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
86e3993f4dee934ca8a2927de61cd1446ef15a63d62984bef5dfb84610ef5aa5
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 12c16baed6578bf50fb0eaa233f2bc84.cloudfront.net (CloudFront)
ETag
W/"324-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
804
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Tue, 03 Sep 2019 01:33:30 GMT
Vary
Accept-Encoding
Content-Type
image/svg+xml
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
y0VLc5rvceE8wB90KXGVPQ4MM9i_1ZulZW21F6Y5QAuUIGlssia-hw==
BlueKeep-1.png
blog.rapid7.com/content/images/2019/09/
192 KB
193 KB
Image
General
Full URL
https://blog.rapid7.com/content/images/2019/09/BlueKeep-1.png
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
9667c3ccc3f291e970a218e02b1862c9f535c4ba588d86c1fc42e8f29f5656e2
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 9d27077cd67d98c0474b05ec9d68df4a.cloudfront.net (CloudFront)
ETag
W/"3006a-16d072c7c90"
Age
271
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
196714
Last-Modified
Fri, 06 Sep 2019 15:23:39 GMT
Server
nginx/1.10.3 (Ubuntu)
Date
Fri, 06 Sep 2019 16:03:29 GMT
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Cache-Control
public, max-age=31536000
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
ncHwcEd_JrlV5BbgM0dV88FBju_x4oeO1N9HPoPYF92XUxpPourdrA==
up-arrow.png
blog.rapid7.com/assets/images/
1 KB
2 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/up-arrow.png?v=ac87d9de3b
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
07554b9a4e12648d63b6f1b48e1c2ffd8870acf67a2884e6c4ed9c92044860f2
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 850ccace60916919bf31313cb9176e01.cloudfront.net (CloudFront)
ETag
W/"449-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
1097
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
Date
Fri, 06 Sep 2019 18:40:23 GMT
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
H7Z0uhOJ4S_nues8B2gwInPniApfyf0FjRLWIBEn1q2kv7_wWNVJSA==
jquery.min.js
www.rapid7.com/includes/js/
83 KB
30 KB
Script
General
Full URL
https://www.rapid7.com/includes/js/jquery.min.js
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.32.145.141 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-32-145-141.fra56.r.cloudfront.net
Software
Microsoft-IIS/8.5 /
Resource Hash
26896559e0cc85fb441792c86279304693546375f1144040e46cd910362b8e43
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
X-Content-Type-Options nosniff
X-Frame-Options ALLOW-FROM https://content.rapid7.com
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://rapid7.lookbookhq.com https://content.rapid7.com
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
8
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-XSS-Protection
1; mode=block
Last-Modified
Tue, 03 Sep 2019 15:14:49 GMT
Server
Microsoft-IIS/8.5
X-Frame-Options
ALLOW-FROM https://content.rapid7.com
Date
Fri, 06 Sep 2019 18:40:04 GMT
Vary
Accept-Encoding
Content-Type
application/javascript
Via
1.1 7483360604f484b4fd54bffc9e822f46.cloudfront.net (CloudFront)
Cache-Control
no-cache
X-Amz-Cf-Pop
FRA56
X-Amz-Cf-Id
cQNp4wMwN-p72S4ilSifMtCY7d3BtmpQcpVQ4m5m0S2plKhKOR2cIg==
all.js
blog.rapid7.com/assets/js/
317 KB
79 KB
Script
General
Full URL
https://blog.rapid7.com/assets/js/all.js?v=ac87d9de3b
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
28ddfed78fc815e0fb6b0198e7d6876957058a443aa61290110db53e97c2d9af
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Content-Encoding
gzip
ETag
W/"4f265-16c687214fc"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Fri, 06 Sep 2019 17:43:09 GMT
Vary
Accept-Encoding
Content-Type
application/javascript; charset=UTF-8
Via
1.1 16dc09493f48bbc1fd2cdd6e175a94f7.cloudfront.net (CloudFront)
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
cQfi7D-W2SdZwv7XnBgApuTKuxRtxDql5c5LwSFhtHRaE8DQUmXeIA==
count.js
rapid7.disqus.com/
0
0

run_prettify.js
cdn.rawgit.com/google/code-prettify/master/loader/
18 KB
8 KB
Script
General
Full URL
https://cdn.rawgit.com/google/code-prettify/master/loader/run_prettify.js?skin=desert
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.237.11 Dallas, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
7285646ea1d6480a26b5c3d66f75edac636a664b9ef84bbd5fb63122065bb668
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload, max-age=31536000; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 06 Sep 2019 18:40:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
cf-ray
512252debb5e9c3f-AMS
x-cache
HIT
status
200
vary
Accept-Encoding
rawgit-cache-status
EXPIRED
content-type
application/javascript;charset=utf-8
server
NetDNA-cache/2.2
etag
W/"8fc3e48451b6bbfbaf957e9ce3e8b49831a91b57"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; preload, max-age=31536000; preload
sunset
Tue, 01 Oct 2019 00:00:00 GMT
access-control-allow-origin
*
cache-control
max-age=86400
x-robots-tag
none
link
<https://rawgit.com/>; rel="sunset"; title="RawGit will soon shut down. Please stop using it."
css
fonts.googleapis.com/
5 KB
624 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Montserrat:400,500,700
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
a4e2dbd3ff8ff006e1ce2f2d9165147ae16c775722280b0b0ca4dc1138daeecf
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Fri, 06 Sep 2019 18:40:23 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Fri, 06 Sep 2019 18:40:23 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
x-xss-protection
0
expires
Fri, 06 Sep 2019 18:40:23 GMT
css
fonts.googleapis.com/
6 KB
641 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Hind:400,500,600,700,300
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
a3f9152ee8fbe84c30a7aee69baea688d553c1bc1e35614e93bcf180268a8197
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Fri, 06 Sep 2019 18:40:23 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Fri, 06 Sep 2019 18:40:23 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
x-xss-protection
0
expires
Fri, 06 Sep 2019 18:40:23 GMT
gtm.js
www.googletagmanager.com/
123 KB
32 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WBTPTVC
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
589268297cf28337fb60a47fdafb5dac8b7fe327b0d7f0df5a3fd65a309d80b5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 06 Sep 2019 18:40:23 GMT
content-encoding
br
last-modified
Fri, 06 Sep 2019 18:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
33011
x-xss-protection
0
expires
Fri, 06 Sep 2019 18:40:23 GMT
fx67kMSZkDNhEN6xy1zV3x.html
play.vidyard.com/ Frame 6274
0
0
Document
General
Full URL
https://play.vidyard.com/fx67kMSZkDNhEN6xy1zV3x.html?v=3.1.1
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.181 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
X-Frame-Options ALLOWALL

Request headers

:method
GET
:authority
play.vidyard.com
:scheme
https
:path
/fx67kMSZkDNhEN6xy1zV3x.html?v=3.1.1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/

Response headers

status
200
content-type
text/html; charset=utf-8
access-control-allow-origin
*
x-frame-options
ALLOWALL
cache-control
public, max-age=15, must-revalidate
etag
W/"f08-Qrx8H+ZM0t0M7UYN8ZaFuLDrHUo"
content-encoding
gzip
accept-ranges
bytes
date
Fri, 06 Sep 2019 18:40:23 GMT
via
1.1 varnish
age
8601
x-served-by
cache-hhn4027-HHN
x-cache
HIT
x-cache-hits
1
x-timer
S1567795224.983049,VS0,VE1
vary
X-ThumbnailAB, accept-language, Accept-Encoding
content-length
1411
JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
fonts.gstatic.com/s/montserrat/v14/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v14/JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0ce5a460ace775560c3344a43245687bdbec5cb8ee20d209ab9fa67f4e09a3e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Montserrat:400,500,700
Origin
https://blog.rapid7.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 02 Sep 2019 19:21:53 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 03:46:48 GMT
server
sffe
age
343110
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
13708
x-xss-protection
0
expires
Tue, 01 Sep 2020 19:21:53 GMT
BlueKeep.jpg
blog.rapid7.com/content/images/2019/09/
39 KB
40 KB
Image
General
Full URL
https://blog.rapid7.com/content/images/2019/09/BlueKeep.jpg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
dabb8f17b99160f1fb6cd4c6a876ab5125546be5eb67da2e74f385e70ddcdc39
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
ETag
W/"9c5d-16d06cc1fcb"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Miss from cloudfront
Connection
keep-alive
Content-Length
40029
Last-Modified
Fri, 06 Sep 2019 13:38:23 GMT
Server
nginx/1.10.3 (Ubuntu)
Date
Fri, 06 Sep 2019 18:40:24 GMT
X-Frame-Options
SAMEORIGIN
Content-Type
image/jpeg
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
FFifWoNil4mzTS3d_40t5WBl_c6cFIyu2WzkfxcApmq3lMuOIrOGxA==
comment-icon.svg
blog.rapid7.com/assets/images/
829 B
1 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/comment-icon.svg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
69004462cdb88332020b33a8910d5fbbc4c74a80dbdd618abc70497254f6d585
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/assets/css/style.css?v=ac87d9de3b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 16dc09493f48bbc1fd2cdd6e175a94f7.cloudfront.net (CloudFront)
ETag
W/"33d-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Miss from cloudfront
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
829
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
Date
Fri, 06 Sep 2019 18:40:24 GMT
X-Frame-Options
SAMEORIGIN
Content-Type
image/svg+xml
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
e9HWjVgp0yTha-tNY4x5pqlupQrlTvt_lKU1RE69wvgsMKIXCnP5DQ==
5aU69_a8oxmIdGl4BDGwgDI.woff2
fonts.gstatic.com/s/hind/v10/
8 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v10/5aU69_a8oxmIdGl4BDGwgDI.woff2
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
42610841f3d39a01788c09d6a72b2f7e609cfb75b8e52eb4b031c12ad76f6ca3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Hind:400,500,600,700,300
Origin
https://blog.rapid7.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 02 Sep 2019 11:34:26 GMT
x-content-type-options
nosniff
last-modified
Mon, 22 Jul 2019 19:18:06 GMT
server
sffe
age
371157
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
8672
x-xss-protection
0
expires
Tue, 01 Sep 2020 11:34:26 GMT
JTURjIg1_i6t8kCHKm45_ZpC3gnD_vx3rCs.woff2
fonts.gstatic.com/s/montserrat/v14/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v14/JTURjIg1_i6t8kCHKm45_ZpC3gnD_vx3rCs.woff2
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cedb226bd7759d04b58baa1a609e1aeecc1aa5c6c3280c4db153019f426f3de0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Montserrat:400,500,700
Origin
https://blog.rapid7.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 23 Aug 2019 10:51:54 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 03:46:41 GMT
server
sffe
age
1237709
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
13640
x-xss-protection
0
expires
Sat, 22 Aug 2020 10:51:54 GMT
5aU19_a8oxmIfJpbERySjRhc9V0.woff2
fonts.gstatic.com/s/hind/v10/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v10/5aU19_a8oxmIfJpbERySjRhc9V0.woff2
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9b4e294d541e0ac9f07c7f1a3433f3653da436f4ed90d538a73657a2836c24b4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Hind:400,500,600,700,300
Origin
https://blog.rapid7.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 23 Aug 2019 10:56:17 GMT
x-content-type-options
nosniff
last-modified
Mon, 22 Jul 2019 19:18:29 GMT
server
sffe
age
1237446
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
8744
x-xss-protection
0
expires
Sat, 22 Aug 2020 10:56:17 GMT
5aU19_a8oxmIfNJdERySjRhc9V0.woff2
fonts.gstatic.com/s/hind/v10/
8 KB
8 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v10/5aU19_a8oxmIfNJdERySjRhc9V0.woff2
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
3e88e28948cf5add61da3c727ab5af095d00126dd2f72a352e0893f4b9d0ba15
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Hind:400,500,600,700,300
Origin
https://blog.rapid7.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 25 Aug 2019 08:42:02 GMT
x-content-type-options
nosniff
last-modified
Mon, 22 Jul 2019 19:18:00 GMT
server
sffe
age
1072701
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
8384
x-xss-protection
0
expires
Mon, 24 Aug 2020 08:42:02 GMT
5aU19_a8oxmIfLZcERySjRhc9V0.woff2
fonts.gstatic.com/s/hind/v10/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/hind/v10/5aU19_a8oxmIfLZcERySjRhc9V0.woff2
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c3864e68c92a78de7d1309478ac5e9c59d7df8551fc188d3cd5e0fe3b197d509
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Hind:400,500,600,700,300
Origin
https://blog.rapid7.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 02 Sep 2019 17:37:45 GMT
x-content-type-options
nosniff
last-modified
Mon, 22 Jul 2019 19:18:19 GMT
server
sffe
age
349358
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
8780
x-xss-protection
0
expires
Tue, 01 Sep 2020 17:37:45 GMT
embed.js
rapid7.disqus.com/
65 KB
22 KB
Script
General
Full URL
https://rapid7.disqus.com/embed.js
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
996b571ee073f1271b0321c581d8c8a72ab7039a6737d6fd4206547ef3d85664
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 06 Sep 2019 18:40:24 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21897
rss-icon.svg
blog.rapid7.com/assets/images/
777 B
1 KB
Image
General
Full URL
https://blog.rapid7.com/assets/images/rss-icon.svg
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
7674f919b19bf66d63b8a844d9b61d6aedd3d4012e30e0c5c78436de753fc0ac
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/assets/css/style.css?v=ac87d9de3b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Via
1.1 12c16baed6578bf50fb0eaa233f2bc84.cloudfront.net (CloudFront)
ETag
W/"309-16c687214ec"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Hit from cloudfront
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
777
Last-Modified
Tue, 06 Aug 2019 19:40:02 GMT
Server
nginx/1.10.3 (Ubuntu)
Date
Sun, 01 Sep 2019 21:31:58 GMT
X-Frame-Options
SAMEORIGIN
Content-Type
image/svg+xml
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
X-Amz-Cf-Id
ohOAb71fGqFi4wkJp8L1gWzUhXnO4jqA0wLzW4erkqaJ9v8LmbuTTQ==
me
geoip-js.maxmind.com/geoip/v2.1/country/
741 B
912 B
XHR
General
Full URL
https://geoip-js.maxmind.com/geoip/v2.1/country/me?referrer=https%3A%2F%2Fblog.rapid7.com
Requested by
Host: js.maxmind.com
URL: https://js.maxmind.com/js/apis/geoip2/v2.1/geoip2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:252f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3ef3f8b5a90e9b2026e1baa7f842e85768c45976970568400a80630d983d62c9

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 06 Sep 2019 18:40:24 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
status
200
content-type
application/vnd.maxmind.com-country+json; charset=UTF-8; version=2.1
access-control-allow-origin
*
cf-ray
512292360e15595e-VIE
content-length
741
/
blog.rapid7.com/ghost/api/v0.1/posts/
11 KB
4 KB
XHR
General
Full URL
https://blog.rapid7.com/ghost/api/v0.1/posts/?include=tags&limit=2&filter=id%3A-5d72600469380c18ceb5518c%2Btags%3A%5Bmetasploit%5D&formats=plaintext&client_id=ghost-frontend&client_secret=59a2130c5b51
Requested by
Host: www.rapid7.com
URL: https://www.rapid7.com/includes/js/jquery.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.87 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-87.fra53.r.cloudfront.net
Software
nginx/1.10.3 (Ubuntu) / Express
Resource Hash
b1a10382bcab2692a07c355730a48e6345af3d83514544a4103c7766b54f8ff2
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Request headers

Accept
*/*
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Content-Security-Policy
frame-ancestors 'self' https://www.rapid7.com
Content-Encoding
gzip
ETag
W/"2ce3-lRQ5Iug/YQj48/n9gPvEhE9Ey5M"
X-Amz-Cf-Pop
FRA53-C1
X-Powered-By
Express
X-Cache
Miss from cloudfront
Connection
keep-alive
Content-Length
3576
Server
nginx/1.10.3 (Ubuntu)
X-Frame-Options
SAMEORIGIN
Date
Fri, 06 Sep 2019 18:40:24 GMT
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 12c16baed6578bf50fb0eaa233f2bc84.cloudfront.net (CloudFront)
Cache-Control
no-cache, private, no-store, must-revalidate, max-stale=0, post-check=0, pre-check=0
X-Amz-Cf-Id
aOTizfzb-qmZZ4mijHY39tjpqRUlFk1AXHdUgPav2LKXysJ2uxpc2g==
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WBTPTVC
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
7011
date
Fri, 06 Sep 2019 16:43:33 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
17803
expires
Fri, 06 Sep 2019 18:43:33 GMT
desert.css
cdn.jsdelivr.net/gh/google/code-prettify@master/loader/skins/
914 B
543 B
Stylesheet
General
Full URL
https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/skins/desert.css
Requested by
Host: cdn.rawgit.com
URL: https://cdn.rawgit.com/google/code-prettify/master/loader/run_prettify.js?skin=desert
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
5d39ff82989d5d48695a4c9ef8883fbbb9f68ee83b7bc771b68d18281548889a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT, HIT
status
200
content-length
385
etag
W/"392-JmOhmNGjmTQ+PuEBJrXkJZkd7dU"
x-served-by
cache-ams21027-AMS, cache-hhn4063-HHN
jsd-meta
1551799437101, 43f7d92de721, pk, 1
date
Fri, 06 Sep 2019 18:40:24 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=604800, s-maxage=43200
accept-ranges
bytes
timing-allow-origin
*
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=2007984622&t=pageview&_s=1&dl=https%3A%2F%2Fblog.rapid7.com%2F2019%2F09%2F06%2Finitial-metasploit-exploit-module-for-bluekeep-cve-2019-...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_gid=1924609661.1567795224&gjid=470444967&_v=j79&z=272239118
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_v=j79&z=272239118
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_v=j79&z=272239118&slf_rd=1&random=2848575663
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_v=j79&z=272239118&slf_rd=1&random=2848575663
Requested by
Host: blog.rapid7.com
URL: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 06 Sep 2019 18:40:24 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 06 Sep 2019 18:40:24 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-4622520-1&cid=1921614652.1567795224&jid=940579174&_v=j79&z=272239118&slf_rd=1&random=2848575663
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
lounge.e1ba106031160b53ce0a17747e335a19.css
c.disquscdn.com/next/embed/styles/
0
0

common.bundle.0f667ce3f3c4c23c241397158b549cbc.js
c.disquscdn.com/next/embed/
0
0

lounge.bundle.fdfbc7740a217a06306813dc9e4ffb34.js
c.disquscdn.com/next/embed/
0
0

config.js
disqus.com/next/
0
0

/
disqus.com/embed/comments/ Frame CF5C
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=rapid7&t_i=5d72600469380c18ceb5518c&t_u=https%3A%2F%2Fblog.rapid7.com%2F2019%2F09%2F06%2Finitial-metasploit-exploit-module-for-bluekeep-cve-2019-0708%2F&t_d=Initial%20Metasploit%20Exploit%20Module%20for%20BlueKeep%20(CVE-2019-0708)&t_t=Initial%20Metasploit%20Exploit%20Module%20for%20BlueKeep%20(CVE-2019-0708)&s_o=default
Requested by
Host: rapid7.disqus.com
URL: https://rapid7.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/

Response headers

Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Fri, 06 Sep 2019 15:25:28 GMT
ETag
W/"lounge:view:7622217604.c8f271f76fdbf202e6b4c3ff2a357245.2"
Content-Encoding
gzip
Content-Length
2684
Date
Fri, 06 Sep 2019 18:40:24 GMT
Age
8
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
realtime.af77184dec69e96e69aff958ae2bb738.css
c.disquscdn.com/next/embed/styles/ Frame A4AA
337 B
310 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Requested by
Host: rapid7.disqus.com
URL: https://rapid7.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:50a6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 06 Sep 2019 18:40:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
16858924
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
244
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Fri, 02 Nov 2018 00:21:20 GMT
server
cloudflare
fastly-debug-digest
ddbb547324842fbef412f9cb6a75e494efb72ac30deb102492dc2845863dccf3
etag
"5bdb9880-f4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
5122923af9b9cbb0-VIE
expires
Fri, 08 Nov 2019 10:18:08 GMT
realtime.af77184dec69e96e69aff958ae2bb738.css
c.disquscdn.com/next/embed/styles/ Frame C72D
337 B
449 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Requested by
Host: rapid7.disqus.com
URL: https://rapid7.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:50a6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 06 Sep 2019 18:40:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
16858924
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
244
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Fri, 02 Nov 2018 00:21:20 GMT
server
cloudflare
fastly-debug-digest
ddbb547324842fbef412f9cb6a75e494efb72ac30deb102492dc2845863dccf3
etag
"5bdb9880-f4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
5122923af9c1cbb0-VIE
expires
Fri, 08 Nov 2019 10:18:08 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
rapid7.disqus.com
URL
https://rapid7.disqus.com/count.js
Domain
c.disquscdn.com
URL
https://c.disquscdn.com/next/embed/styles/lounge.e1ba106031160b53ce0a17747e335a19.css
Domain
c.disquscdn.com
URL
https://c.disquscdn.com/next/embed/common.bundle.0f667ce3f3c4c23c241397158b549cbc.js
Domain
c.disquscdn.com
URL
https://c.disquscdn.com/next/embed/lounge.bundle.fdfbc7740a217a06306813dc9e4ffb34.js
Domain
disqus.com
URL
https://disqus.com/next/config.js

Verdicts & Comments Add Verdict or Comment

30 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| geoip2 function| initCountry function| updateCountryData function| alphabetizeOptions object| dataLayer object| ghost function| disqus_config function| $ function| jQuery function| postscribe object| google_tag_manager function| _createClass function| _classCallCheck function| getParameterByName object| community object| Foundation object| whatInput function| SearchIndex function| Bloodhound function| moment function| List string| GoogleAnalyticsObject function| ga boolean| PR_SHOULD_USE_CONTINUATION object| PR object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| DISQUS

0 Cookies

1 Console Messages

Source Level URL
Text
console-api log URL: https://blog.rapid7.com/assets/js/all.js?v=ac87d9de3b(Line 5497)
Message:
related-posts

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' https://www.rapid7.com
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

blog.rapid7.com
c.disquscdn.com
cdn.jsdelivr.net
cdn.rawgit.com
disqus.com
fonts.googleapis.com
fonts.gstatic.com
geoip-js.maxmind.com
js.maxmind.com
play.vidyard.com
rapid7.com
rapid7.disqus.com
stats.g.doubleclick.net
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.rapid7.com
c.disquscdn.com
disqus.com
rapid7.disqus.com
13.32.145.141
143.204.212.111
143.204.214.87
151.101.112.134
151.101.113.181
151.101.192.134
151.139.237.11
2606:4700::6810:252f
2606:4700::6810:262f
2606:4700::6810:50a6
2a00:1450:4001:819::2008
2a00:1450:4001:819::200e
2a00:1450:4001:81c::2003
2a00:1450:4001:81c::2004
2a00:1450:4001:81d::2003
2a00:1450:4001:81f::200a
2a00:1450:400c:c00::9b
2a04:4e42:1b::621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