URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Submission: On November 07 via manual from GB — Scanned from GB

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 10 HTTP transactions. The main IP is 2606:50c0:8003::153, located in United States and belongs to FASTLY, US. The main domain is 0x00-0x00.github.io.
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on April 7th 2022. Valid for: a year.
This is the only time 0x00-0x00.github.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
10 2606:50c0:800... 54113 (FASTLY)
10 1
Apex Domain
Subdomains
Transfer
10 github.io
0x00-0x00.github.io
253 KB
10 1
Domain Requested by
10 0x00-0x00.github.io 0x00-0x00.github.io
10 1

This site contains links to these domains. Also see Links.

Domain
www.cyberark.com
github.com
www.twitter.com
Subject Issuer Validity Valid
*.github.com
DigiCert TLS RSA SHA256 2020 CA1
2022-04-07 -
2023-04-07
a year crt.sh

This page contains 1 frames:

Primary Page: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Frame ID: 8E0998157BEDBCF31692AB5081EF36DE
Requests: 10 HTTP requests in this frame

Screenshot

Page Title

How to bypass AMSI and execute ANY malicious Powershell code | zc00l blog

Detected technologies

Overall confidence: 100%
Detected patterns
  • <!-- Begin Jekyll SEO tag

Overall confidence: 100%
Detected patterns
  • ^https?://[^/]+\.github\.io

Page Statistics

10
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

253 kB
Transfer

280 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
0x00-0x00.github.io/research/2018/10/28/
27 KB
9 KB
Document
General
Full URL
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
db5e627a81ed8ca5db113392ff1076021b06d09088f3267fe6789c9642e98ad6
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36
accept-language
en-GB,en;q=0.9

Response headers

accept-ranges
bytes
access-control-allow-origin
*
age
0
cache-control
max-age=600
content-encoding
gzip
content-length
8483
content-type
text/html; charset=utf-8
date
Mon, 07 Nov 2022 15:41:37 GMT
etag
W/"5eea34ac-6bbc"
expires
Mon, 07 Nov 2022 15:51:37 GMT
last-modified
Wed, 17 Jun 2020 15:20:12 GMT
permissions-policy
interest-cohort=()
server
GitHub.com
strict-transport-security
max-age=31556952
vary
Accept-Encoding
via
1.1 varnish
x-cache
MISS
x-cache-hits
0
x-fastly-request-id
ac6c02e3624ef14ca272019e8ce33892ff6c05bb
x-github-request-id
B390:356D:21F058:22A532:63692731
x-proxy-cache
MISS
x-served-by
cache-lcy19228-LCY
x-timer
S1667835697.140256,VS0,VE119
main.css
0x00-0x00.github.io/assets/
7 KB
2 KB
Stylesheet
General
Full URL
https://0x00-0x00.github.io/assets/main.css
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
f861c07e386d770d235e0a7d5674e3b851103960f1b675d5ac614b01f881e02e
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
c5a3b733ebfc2b2d8f23fffc57558f40d81f3802
strict-transport-security
max-age=31556952
content-encoding
gzip
via
1.1 varnish
date
Mon, 07 Nov 2022 15:41:37 GMT
age
0
x-cache
MISS
x-cache-hits
0
x-proxy-cache
MISS
content-length
1861
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:12 GMT
server
GitHub.com
x-github-request-id
5E34:356D:21F075:22A54C:63692731
x-timer
S1667835697.292590,VS0,VE134
etag
W/"5eea34ac-1b46"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
expires
Mon, 07 Nov 2022 15:51:37 GMT
amsi_01.JPG
0x00-0x00.github.io/assets/
23 KB
23 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_01.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
c3cfdfa23aaa9bbd046d124b97b20243014b115c1528edceebfe9ef6527002f2
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
12b2392e199da49c25ab95018e6ce3b07e523c34
strict-transport-security
max-age=31556952
date
Mon, 07 Nov 2022 15:41:37 GMT
via
1.1 varnish
x-cache-hits
0
age
0
x-cache
MISS
x-proxy-cache
MISS
content-length
23765
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
9194:77FE:212DD4:21E243:63692731
x-timer
S1667835697.292547,VS0,VE119
etag
"5eea34a7-5cd5"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
expires
Mon, 07 Nov 2022 15:51:37 GMT
amsi_02.JPG
0x00-0x00.github.io/assets/
21 KB
21 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_02.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
5b103747c64980bbfd436b11c8fa2bdfd8560211692d65de2a881ecee7d27c4a
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
fc71bebbc3b799acfc57856717243887ff22b65b
strict-transport-security
max-age=31556952
date
Mon, 07 Nov 2022 15:41:37 GMT
via
1.1 varnish
x-cache-hits
0
age
0
x-cache
MISS
x-proxy-cache
MISS
content-length
21236
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
D4DE:C002:208E79:2142E8:63692731
x-timer
S1667835697.314596,VS0,VE116
etag
"5eea34a7-52f4"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
expires
Mon, 07 Nov 2022 15:51:37 GMT
amsi_03.JPG
0x00-0x00.github.io/assets/
12 KB
13 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_03.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
b91f995e7e225eda0d06ca68fde19c64ce53bc8dbf8710b7fa6498cd8b6814ac
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
7c2c965b1a87db7e513ab64128009d07458c3c23
strict-transport-security
max-age=31556952
date
Mon, 07 Nov 2022 15:41:37 GMT
via
1.1 varnish
x-cache-hits
0
age
0
x-cache
MISS
x-proxy-cache
MISS
content-length
12636
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
D616:EE33:213BB4:21F0BB:63692731
x-timer
S1667835697.315107,VS0,VE114
etag
"5eea34a7-315c"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
expires
Mon, 07 Nov 2022 15:51:37 GMT
amsi_04.JPG
0x00-0x00.github.io/assets/
18 KB
18 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_04.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
fb130a57f4d5a3e62a12fdb83e2b707a71ca077b80065f463147b8ee996edfe6
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
953522966dfb283b735d800aa4d3aa5e9f44f3fb
strict-transport-security
max-age=31556952
date
Mon, 07 Nov 2022 15:41:37 GMT
via
1.1 varnish
x-cache-hits
0
age
0
x-cache
MISS
x-proxy-cache
MISS
content-length
18016
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
558A:02B1:21CB38:22807B:63692731
x-timer
S1667835697.315103,VS0,VE112
etag
"5eea34a7-4660"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
expires
Mon, 07 Nov 2022 15:51:37 GMT
amsi_05.JPG
0x00-0x00.github.io/assets/
19 KB
19 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_05.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
55942793c4789f828655418fa3864a1d8a10ad49263706e24b1e5f3cd9a7f027
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
d639f7aad053357e9dc40052bfdaf2b2d57e9382
strict-transport-security
max-age=31556952
date
Mon, 07 Nov 2022 15:41:37 GMT
via
1.1 varnish
x-cache-hits
0
age
0
x-cache
MISS
x-proxy-cache
MISS
content-length
19356
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
7C28:2E6E:203503:20E9D5:63692731
x-timer
S1667835697.315073,VS0,VE117
etag
"5eea34a7-4b9c"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
expires
Mon, 07 Nov 2022 15:51:37 GMT
amsi_06.JPG
0x00-0x00.github.io/assets/
38 KB
38 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_06.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
548a092e1a3d7dbce81a5f9135e5f30c6178c6ef01258fbad5dae784241b9af7
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
8745420f21d0205d69594efc2361a5f2691eb9e8
strict-transport-security
max-age=31556952
date
Mon, 07 Nov 2022 15:41:37 GMT
via
1.1 varnish
x-cache-hits
0
age
0
x-cache
MISS
x-proxy-cache
MISS
content-length
38905
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
1964:1EE5:211DEE:21D2CA:63692731
x-timer
S1667835697.315044,VS0,VE113
etag
"5eea34a7-97f9"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
expires
Mon, 07 Nov 2022 15:51:37 GMT
amsi_07.JPG
0x00-0x00.github.io/assets/
106 KB
106 KB
Image
General
Full URL
https://0x00-0x00.github.io/assets/amsi_07.JPG
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
6647ee6af809d0e2bd4bdc2cc1ba61213e969850fe1106417c7b49ca5a68773d
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
44340f67522a3e38b37ab024b06f555363ba9e19
strict-transport-security
max-age=31556952
date
Mon, 07 Nov 2022 15:41:37 GMT
via
1.1 varnish
x-cache-hits
0
age
0
x-cache
MISS
x-proxy-cache
MISS
content-length
108318
x-served-by
cache-lcy19228-LCY
last-modified
Wed, 17 Jun 2020 15:20:07 GMT
server
GitHub.com
x-github-request-id
3634:11D2E:21A86E:225E74:63692731
x-timer
S1667835697.315379,VS0,VE117
etag
"5eea34a7-1a71e"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
expires
Mon, 07 Nov 2022 15:51:37 GMT
minima-social-icons.svg
0x00-0x00.github.io/assets/
10 KB
4 KB
Other
General
Full URL
https://0x00-0x00.github.io/assets/minima-social-icons.svg
Requested by
Host: 0x00-0x00.github.io
URL: https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
39f87ca832d235ede52f66a4d7ae03d050e6a8b4e1ceba6a5b646fd43ee76223
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

x-fastly-request-id
c6f121f28641635e2be3eae859409d67b8ba24ca
strict-transport-security
max-age=31556952
content-encoding
gzip
via
1.1 varnish
date
Mon, 07 Nov 2022 15:41:37 GMT
age
0
x-cache
MISS
x-cache-hits
0
x-proxy-cache
MISS
content-length
4030
x-served-by
cache-lcy19228-LCY
last-modified
Tue, 16 Jun 2020 18:22:04 GMT
server
GitHub.com
x-github-request-id
549C:9A5E:20F359:21A875:63692731
x-timer
S1667835697.316007,VS0,VE119
etag
W/"5ee90dcc-26b2"
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=600
permissions-policy
interest-cohort=()
accept-ranges
bytes
x-origin-cache
HIT
expires
Mon, 07 Nov 2022 15:51:37 GMT

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation

0 Cookies

1 Console Messages

Source Level URL
Text
security warning
Message:
Error with Permissions-Policy header: Origin trial controlled feature not enabled: 'interest-cohort'.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31556952