URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Submission: On October 21 via api from US

Summary

This website contacted 86 IPs in 9 countries across 65 domains to perform 296 HTTP transactions. The main IP is 50.31.169.131, located in Elk Grove Village, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
4 50.31.169.131 23352 (SERVERCEN...)
22 205.234.175.175 30081 (CACHENETW...)
7 2a00:1450:400... 15169 (GOOGLE)
3 13.225.74.186 16509 (AMAZON-02)
6 2.18.234.21 16625 (AKAMAI-AS)
15 2.18.235.40 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
10 172.217.16.162 15169 (GOOGLE)
1 13.225.78.46 16509 (AMAZON-02)
5 54.230.95.177 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
3 151.139.128.10 20446 (HIGHWINDS3)
1 3.8.71.160 16509 (AMAZON-02)
2 2.18.234.190 16625 (AKAMAI-AS)
2 34.230.155.118 14618 (AMAZON-AES)
2 143.204.98.215 16509 (AMAZON-02)
1 54.76.0.5 16509 (AMAZON-02)
2 151.101.12.239 54113 (FASTLY)
2 34.241.149.220 16509 (AMAZON-02)
2 10 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.203 27281 (QUANTCAST)
1 46.228.164.13 56396 (TURN)
5 2a03:2880:f01... 32934 (FACEBOOK)
1 151.101.12.157 54113 (FASTLY)
1 13.225.78.106 16509 (AMAZON-02)
1 35.190.92.63 15169 (GOOGLE)
1 35.165.247.37 16509 (AMAZON-02)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 52.1.219.33 14618 (AMAZON-AES)
1 143.204.101.45 16509 (AMAZON-02)
2 52.239.137.4 8075 (MICROSOFT...)
1 3 2.19.43.224 20940 (AKAMAI-ASN1)
2 4 35.227.248.159 15169 (GOOGLE)
1 2600:9000:200... 16509 (AMAZON-02)
1 2 35.190.59.101 15169 (GOOGLE)
20 52.5.37.73 14618 (AMAZON-AES)
5 2606:4700::68... 13335 (CLOUDFLAR...)
4 2a00:1450:400... 15169 (GOOGLE)
7 2.18.232.28 16625 (AKAMAI-AS)
1 34.240.220.248 16509 (AMAZON-02)
1 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.190.40.172 15169 (GOOGLE)
1 2600:9000:215... 16509 (AMAZON-02)
2 70.42.32.127 22075 (AS-OUTBRAIN)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2a05:f500:10:... 14413 (LINKEDIN)
2 34.98.72.95 15169 (GOOGLE)
1 34.199.176.61 14618 (AMAZON-AES)
5 2a00:1450:400... 15169 (GOOGLE)
8 54.192.94.44 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
3 52.86.29.231 14618 (AMAZON-AES)
2 52.206.179.81 14618 (AMAZON-AES)
1 104.244.42.133 13414 (TWITTER)
1 2606:4700::68... 13335 (CLOUDFLAR...)
3 91.228.74.223 27281 (QUANTCAST)
2 35.186.226.184 15169 (GOOGLE)
5 2a03:2880:f11... 32934 (FACEBOOK)
1 178.250.2.130 44788 (ASN-CRITE...)
2 3 52.49.48.201 16509 (AMAZON-02)
25 54.192.94.12 16509 (AMAZON-02)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 3 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 35.201.67.47 15169 (GOOGLE)
5 9 152.199.22.24 15133 (EDGECAST)
4 104.17.193.78 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 151.101.114.2 54113 (FASTLY)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
2 2a00:1450:400... 15169 (GOOGLE)
1 52.10.35.234 16509 (AMAZON-02)
2 2 37.252.173.22 29990 (ASN-APPNEXUS)
6 35.161.253.167 16509 (AMAZON-02)
2 2 185.64.189.110 62713 (AS-PUBMATIC)
2 2 172.217.21.226 15169 (GOOGLE)
1 2 18.195.155.181 16509 (AMAZON-02)
1 1 185.33.223.100 29990 (ASN-APPNEXUS)
1 1 46.228.164.27 56396 (TURN)
1 52.6.202.179 14618 (AMAZON-AES)
10 13.224.196.19 16509 (AMAZON-02)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
1 2404:6800:401... 15169 (GOOGLE)
1 54.69.119.154 16509 (AMAZON-02)
2 52.86.197.187 14618 (AMAZON-AES)
2 2a00:1450:400... 15169 (GOOGLE)
2 172.217.16.194 15169 (GOOGLE)
2 178.250.0.165 44788 (ASN-CRITE...)
4 35.175.148.181 14618 (AMAZON-AES)
1 104.244.42.131 13414 (TWITTER)
1 52.212.90.74 16509 (AMAZON-02)
296 86
Apex Domain
Subdomains
Transfer
45 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dwgyu36up6iuz.cloudfront.net
dp8hsntg6do36.cloudfront.net
3 MB
27 condenastdigital.com
pixel.condenastdigital.com
capture.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
wren.condenastdigital.com
21 KB
22 arstechnica.net
cdn.arstechnica.net
820 KB
20 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
v4.moatads.com Failed
522 KB
17 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
cm.g.doubleclick.net
pubads.g.doubleclick.net
119 KB
10 google-analytics.com
www.google-analytics.com
22 KB
9 advertising.com
adserver-us.adtech.advertising.com
2 KB
9 ad.gt
a.ad.gt
p.ad.gt
ids.ad.gt
pixels.ad.gt
13 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
64 KB
7 cnevids.com
player.cnevids.com
api.cnevids.com
83 KB
6 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
474 KB
6 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
t.skimresources.com
17 KB
6 google.com
adservice.google.com
ampcid.google.com
www.google.com
2 KB
5 facebook.com
www.facebook.com
894 B
5 googleapis.com
imasdk.googleapis.com
210 KB
5 polarcdn-terrax.com
polarcdn-terrax.com
18 KB
5 facebook.net
connect.facebook.net
240 KB
5 google.de
adservice.google.de
ampcid.google.de
www.google.de
1 KB
5 googletagservices.com
www.googletagservices.com
130 KB
5 arstechnica.com
arstechnica.com
sstats.arstechnica.com
24 KB
4 polarcdn-pentos.com
polarcdn-pentos.com
925 B
4 casalemedia.com
as-sec.casalemedia.com
2 KB
4 tapad.com
pixel.tapad.com
1 KB
4 quantserve.com
secure.quantserve.com
pixel.quantserve.com
7 KB
4 demdex.net
dpm.demdex.net
condenast.demdex.net
10 KB
4 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
46 KB
3 adnxs.com
secure.adnxs.com
ib.adnxs.com
3 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 parsely.com
srv-2019-10-21-18.config.parsely.com
srv-2019-10-21-18.pixel.parsely.com
1 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
2 KB
3 scorecardresearch.com
sb.scorecardresearch.com
1 KB
3 medtargetsystem.com
www.medtargetsystem.com
56 KB
3 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com
90 KB
3 amazon-adsystem.com
c.amazon-adsystem.com
26 KB
2 criteo.com
bidder.criteo.com
290 B
2 emxdgt.com
cs.emxdgt.com
385 B
2 pubmatic.com
image2.pubmatic.com
1 KB
2 2mdn.net
s0.2mdn.net
21 KB
2 snapchat.com
tr.snapchat.com
2 windows.net
optanon.blob.core.windows.net
25 KB
2 turn.com
d.turn.com
sd.turn.com
1 KB
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
125 KB
2 actionbutton.co
embed.actionbutton.co
prod-native.actionbutton.co
17 KB
2 indexww.com
js-sec.indexww.com
32 KB
1 twitter.com
analytics.twitter.com
635 B
1 gstatic.com
csi.gstatic.com
260 B
1 onetrust.com
geolocation.onetrust.com
324 B
1 deepintent.com
match.deepintent.com
218 B
1 jquery.com
code.jquery.com
30 KB
1 plrsrvcs.com
bw-prod.plrsrvcs.com
1 KB
1 criteo.net
static.criteo.net
27 KB
1 polarcdn.com
static.polarcdn.com
118 KB
1 t.co
t.co
447 B
1 quantcount.com
rules.quantcount.com
2 KB
1 consensu.org
api.skimlinks.mgr.consensu.org
636 B
1 everesttech.net
cm.everesttech.net
527 B
1 sc-static.net
sc-static.net
6 KB
1 licdn.com
snap.licdn.com
2 KB
1 sail-horizon.com
ak.sail-horizon.com
42 KB
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 zqtk.net
segment-data.zqtk.net
994 B
1 googletagmanager.com
www.googletagmanager.com
67 KB
0 rubiconproject.com Failed
fastlane.rubiconproject.com Failed
0 rlcdn.com Failed
api.rlcdn.com Failed
0 rkdms.com Failed
mid.rkdms.com Failed
296 65
Domain Requested by
25 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
www.googletagservices.com
22 cdn.arstechnica.net arstechnica.com
20 capture.condenastdigital.com arstechnica.com
10 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
10 www.google-analytics.com 2 redirects www.googletagmanager.com
www.google-analytics.com
arstechnica.com
10 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
9 adserver-us.adtech.advertising.com 5 redirects arstechnica.com
9 px.moatads.com arstechnica.com
8 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
6 images.outbrainimg.com arstechnica.com
6 ids.ad.gt arstechnica.com
6 z.moatads.com arstechnica.com
securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
5 www.facebook.com arstechnica.com
connect.facebook.net
5 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
5 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
static.polarcdn.com
arstechnica.com
5 connect.facebook.net arstechnica.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
5 player.cnevids.com arstechnica.com
cdn.arstechnica.net
player.cnevids.com
5 www.googletagservices.com arstechnica.com
securepubads.g.doubleclick.net
4 v4.moatads.com arstechnica.com
4 polarcdn-pentos.com static.polarcdn.com
4 as-sec.casalemedia.com js-sec.indexww.com
4 tpc.googlesyndication.com securepubads.g.doubleclick.net
4 pixel.tapad.com 2 redirects arstechnica.com
4 arstechnica.com arstechnica.com
cdn.arstechnica.net
3 www.google.de arstechnica.com
3 www.google.com 3 redirects
3 stats.g.doubleclick.net 3 redirects
3 match.adsrvr.org 2 redirects js-sec.indexww.com
3 pixel.quantserve.com arstechnica.com
3 sb.scorecardresearch.com 1 redirects arstechnica.com
www.googletagmanager.com
3 www.medtargetsystem.com arstechnica.com
www.medtargetsystem.com
3 c.amazon-adsystem.com arstechnica.com
c.amazon-adsystem.com
2 bidder.criteo.com static.criteo.net
2 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
2 pagead2.googlesyndication.com arstechnica.com
2 srv-2019-10-21-18.pixel.parsely.com arstechnica.com
2 cs.emxdgt.com 1 redirects arstechnica.com
2 cm.g.doubleclick.net 2 redirects
2 image2.pubmatic.com 2 redirects
2 secure.adnxs.com 2 redirects
2 s0.2mdn.net imasdk.googleapis.com
2 tr.snapchat.com sc-static.net
2 4d.condenastdigital.com pixel.condenastdigital.com
2 infinityid.condenastdigital.com pixel.condenastdigital.com
d2c8v52ll5s99u.cloudfront.net
2 assets.bounceexchange.com tag.bounceexchange.com
assets.bounceexchange.com
2 px.ads.linkedin.com 1 redirects arstechnica.com
2 condenast.demdex.net arstechnica.com
2 p.skimresources.com arstechnica.com
2 r.skimresources.com 1 redirects arstechnica.com
2 optanon.blob.core.windows.net www.googletagmanager.com
optanon.blob.core.windows.net
2 dpm.demdex.net arstechnica.com
2 pixel.condenastdigital.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 widgets.outbrain.com cdn.arstechnica.net
widgets.outbrain.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 js-sec.indexww.com arstechnica.com
1 analytics.twitter.com static.ads-twitter.com
1 wren.condenastdigital.com cdn.arstechnica.net
1 pixels.ad.gt p.ad.gt
1 csi.gstatic.com securepubads.g.doubleclick.net
1 mcdp-nydc1.outbrain.com widgets.outbrain.com
1 geolocation.onetrust.com code.jquery.com
1 match.deepintent.com arstechnica.com
1 sd.turn.com 1 redirects
1 ib.adnxs.com 1 redirects
1 p.ad.gt a.ad.gt
1 code.jquery.com optanon.blob.core.windows.net
1 odb.outbrain.com widgets.outbrain.com
1 bw-prod.plrsrvcs.com static.polarcdn.com
1 t.skimresources.com s.skimresources.com
1 static.criteo.net js-sec.indexww.com
1 static.polarcdn.com securepubads.g.doubleclick.net
1 t.co arstechnica.com
1 ampcid.google.de www.google-analytics.com
1 srv-2019-10-21-18.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 www.linkedin.com 1 redirects
1 log.outbrainimg.com widgets.outbrain.com
1 rules.quantcount.com secure.quantserve.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 ampcid.google.com www.google-analytics.com
1 cm.everesttech.net 1 redirects
1 sstats.arstechnica.com arstechnica.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 prod-native.actionbutton.co embed.actionbutton.co
1 sc-static.net arstechnica.com
1 snap.licdn.com arstechnica.com
1 a.ad.gt www.googletagmanager.com
1 tag.bounceexchange.com arstechnica.com
1 ak.sail-horizon.com www.googletagmanager.com
1 static.ads-twitter.com www.googletagmanager.com
1 d.turn.com arstechnica.com
1 secure.quantserve.com www.googletagmanager.com
1 segment-data.zqtk.net arstechnica.com
1 mb.moatads.com z.moatads.com
1 s.skimresources.com arstechnica.com
1 cdn.mediavoice.com arstechnica.com
1 embed.actionbutton.co arstechnica.com
1 adservice.google.de www.googletagservices.com
1 www.googletagmanager.com arstechnica.com
0 fastlane.rubiconproject.com Failed js-sec.indexww.com
0 api.rlcdn.com Failed js-sec.indexww.com
0 mid.rkdms.com Failed js-sec.indexww.com
296 104
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign RSA OV SSL CA 2018
2019-10-11 -
2021-10-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
c.amazon-adsystem.com
Amazon
2018-12-18 -
2019-11-21
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.google.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.actionbutton.co
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2020-06-27
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-25 -
2019-12-11
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-10-21 -
2020-08-07
10 months crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
*.turn.com
DigiCert SHA2 Secure Server CA
2019-01-25 -
2020-03-31
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
ak.sail-horizon.com
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tag.bounceexchange.com
Let's Encrypt Authority X3
2019-08-25 -
2019-11-23
3 months crt.sh
*.ad.gt
Amazon
2019-07-06 -
2020-08-06
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
medtargetsystem.com
Amazon
2018-11-23 -
2019-12-23
a year crt.sh
sc-static.net
DigiCert SHA2 Secure Server CA
2019-03-11 -
2021-03-15
2 years crt.sh
*.blob.core.windows.net
Microsoft IT TLS CA 5
2019-05-01 -
2021-05-01
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.tapad.com
DigiCert SHA2 Secure Server CA
2018-01-17 -
2019-11-02
2 years crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-13 -
2020-03-21
6 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2019-03-03 -
2020-06-05
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
assets.bounceexchange.com
Let's Encrypt Authority X3
2019-10-13 -
2020-01-11
3 months crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
*.googleapis.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-19 -
2019-12-11
a year crt.sh
tr.snapchat.com
DigiCert SHA2 Secure Server CA
2019-02-19 -
2021-02-23
2 years crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-03-26 -
2020-03-30
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
www.google.de
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-29 -
2020-03-06
6 months crt.sh
ssl880796.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-07-31 -
2020-02-06
6 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh
*.doubleclick.net
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.emxdgt.com
Go Daddy Secure Certificate Authority - G2
2019-07-17 -
2020-07-17
a year crt.sh
*.deepintent.com
Go Daddy Secure Certificate Authority - G2
2018-06-08 -
2020-06-08
2 years crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2019-10-01 -
2019-12-30
3 months crt.sh
*.criteo.com
DigiCert ECC Secure Server CA
2019-03-28 -
2020-04-01
a year crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh

This page contains 19 frames:

Primary Page: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Frame ID: D1E816F91EB13F6E5F504A1D7EB2E86C
Requests: 246 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: C6871543C0DA27363E1F38BE059C8C50
Requests: 1 HTTP requests in this frame

Frame: https://prod-native.actionbutton.co/?isNativeEmbed=true&3732f495-522a-494f-82bd-3404c383741c
Frame ID: 00555647ECF714908AAEBF0F675A317D
Requests: 1 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: 5BF7ECDA42FE41780BCD0D7580F19EC6
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvj9mKT2AWLCHJ2OAP3oZbP9j9MBkAKigKNfEOe_bb3ItaypWuZkjAkuAEMUD3OoKbwkUEBrIxSZmrjC34KwTHD-M5tbAt1bT3nxh0_AYRBtwgEB70k-YtZ2ly5T65PIFrjn0ENqeAY8Ow0hDtuup-OfxmsSuGeFnTxu-PYkRPDz1ijg_EDVVNEGXLhHyiVDqQ8PW24I4DyHGQGIjhrqeK6byad1cp83qmPt5kltNPv-R7uH_rrME47nUYbi7NhEXmENSv076JaeXxwpZZ8ND00mfFL&sig=Cg0ArKJSzOS655Tv5JaDEAE&urlfix=1&adurl=
Frame ID: 9D18786ED6F42672C5C492E2FF276DC9
Requests: 13 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: 4EEC27BDAE9FE2A460DD21AE3141F0B4
Requests: 1 HTTP requests in this frame

Frame: https://tr.snapchat.com/cm/i
Frame ID: 0E2C2BE545636FA4397060C1F865EC1D
Requests: 1 HTTP requests in this frame

Frame: https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Frame ID: 1EA69A08C9CB599854E12507A4461A66
Requests: 1 HTTP requests in this frame

Frame: https://tr.snapchat.com/p
Frame ID: B4C626D270B091E667C2FFCADC1E7FB6
Requests: 1 HTTP requests in this frame

Frame: https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&_sid=c5d81356-9d0d-493f-a3a8-b1d0fafcf875&_vid=5bcf2dbd-6434-4dce-92d6-cb63e518477c&_ak=119-556-B0E9F642&_flash=false&_th=1571681505|1571681505|1
Frame ID: 7096EF13AD46E6856AFD0973BFF2C641
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: B6A2DADC173965E39CA07BE14F474A83
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 3D82FDC13070AD438B7D5D56B396791E
Requests: 27 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 5CAA0ECABD113396A38C4D4F80BCA4CD
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.343.1_en.html
Frame ID: 6E0E8C783B7106F35A3463A2B9DF25AF
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.343.1_en.html
Frame ID: 366758CA54FF6978BD2392A931E71812
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 58C1FF3E4295AA1E00592E5C7686B4F3
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsteCXEzsf76Wl4ZhNOve12sRmUQViphBauBuGPrbe-DMImBvuCSTohwtFJ0KmGRtvAzXs6JW2mmeDMH9mVQMXfd6xNDP_Fbb8Ua32qqua_2LkVGnm3eui3bsznh7DS30ADqHB1keRgbiVZQplmF4sixo5pb5-e-1GqHx_8txZp88sU7crAVJzpTtboUdo48Mg1EqpRVFSYm8pXbbQxq8CSW1KI1FqPuizE2tBziMTeMb-UH0f_8MMl5w2E3T1dmhOWI0BkWKj1oAhv8UnaHP7NjQJHUD9g74f21SvvXAmOw9bUy-gKB1Q&sai=AMfl-YQxBMgzoPCFAIZuxv5gLn6RX24h2tfkc5kpvGrYEU1xaCM3YJkpSHz8PztuQ-01H8gh4_poVaXf8A3C1oJp0MhBsQIvLZ46fLdIQcuHJw&sig=Cg0ArKJSzJ01z7N-foOIEAE&urlfix=1&adurl=
Frame ID: D2911ECC5261BAB61627C13E92E092F1
Requests: 6 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss5aD3Y9t1fwWCvjFPrw5RUJD5JZ-ONt3Ig8J7ECAxzQlXvQ9ZYrhxYsHyeMTY8SU_mM0J4Z_8Bg4tfFDg_nyqOQ-8xYz34igEFyFjBreFNew2nzv-Oy_WaBwPCZtZFMJ5TsYhINe2k6Fn-gi1w2TtE15thc13m0yzI40MbcnbThoRHC8uZar0c_TOHcr8jcAllyotPXCqlD7Vsmllx0yAXwUDD-CSQmV20M1N7DtPZVZlRh1QSBPhUYTQmkA8tVM6b9oZ3JvoabJcB7ySnV0sclgt3Z5-bYUGWwNFwg_rTMxuY4A&sai=AMfl-YR3fQrV0SdoQUBQrluIb0wbf_E6KTxQgLrqHrD34y-X9M46q_O7xAiThnxHghE_wfMNa27Y4MFck9uAlHRNM8d8WoKIrXOqf5bnywOX&sig=Cg0ArKJSzNcP3qOyARECEAE&adurl=
Frame ID: BC2350B8E076E477A688F99C5AA4FC7C
Requests: 7 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: F75EFB9BA4F856BB2507A7ECD6A531DC
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /2mdn\.net/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /2mdn\.net/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i
  • script /google-analytics\.com\/plugins\/ua\/(?:ec|ecommerce)\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/plugins\/ua\/(?:ec|ecommerce)\.js/i

Overall confidence: 100%
Detected patterns
  • script /\.quantserve\.com\/quant\.js/i

Page Statistics

296
Requests

95 %
HTTPS

29 %
IPv6

65
Domains

104
Subdomains

86
IPs

9
Countries

6361 kB
Transfer

13831 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 70
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1571681505612&ns_c=UTF-8&c8=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1571681505612&ns_c=UTF-8&c8=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&c9=
Request Chain 71
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Request Chain 72
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Request Chain 74
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DQQR94CVC07PCMGD9THHRV12&persistence=1&checksum=fb6cd1817924c61a950d1f493916d5963397137566b863742080a708f610d914
Request Chain 89
  • https://cm.everesttech.net/cm/dd?d_uuid=62679995799542354163685637680468357518 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xa304QAAFRhnohN_
Request Chain 98
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&time=1571681505967 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D434737%26url%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252F2015%252F08%252Fhow-security-flaws-work-the-buffer-overflow%252F%26time%3D1571681505967%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&time=1571681505967&liSync=true
Request Chain 150
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&gjid=443737167&_gid=763782570.1571681506&_u=aChAgUAjAAQC~&z=816236640 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&_v=j79&z=816236640 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&_v=j79&z=816236640&slf_rd=1&random=3690117983
Request Chain 155
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._7QHMK1gI; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._7QHMK1gI
Request Chain 156
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._1m9ITzPz; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1571681506;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._1m9ITzPz HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A3ed4e846-f42e-11e9-a940-12724de64e5e;cfp=1;rndc=1571681506;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._1m9ITzPz
Request Chain 159
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._bExmRuQm; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._bExmRuQm
Request Chain 160
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._WPvpQH7g; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._WPvpQH7g
Request Chain 194
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&adnxs_id=$UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3De37c7d18-d322-45ad-bc07-8149ef1d4444%26adnxs_id%3D%24UID HTTP 302
  • https://ids.ad.gt/api/v1/match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&adnxs_id=8946887055383900570
Request Chain 195
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=e37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=e37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://ids.ad.gt/api/v1/t_match?tdid=9fd691f7-3aa7-4aa0-8e91-dd0e9982e769&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Request Chain 196
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://ids.ad.gt/api/v1/pbm_match?pbm=B25E06C1-C956-4EDD-BF8C-A59A453AAA6C&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Request Chain 197
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=e37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm=&google_sc=&google_ula=450542624&id=e37c7d18-d322-45ad-bc07-8149ef1d4444&google_tc= HTTP 302
  • https://ids.ad.gt/api/v1/g_match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&google_gid=CAESEPqaLkJO_ZMQ0qhWz7bZpLw&google_cver=1&google_ula=450542624,0
Request Chain 198
  • https://cs.emxdgt.com/um?redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24UID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://ib.adnxs.com/getuid?https://cs.emxdgt.com/umcheck?apnxid=$UID&redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24EMXUID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://cs.emxdgt.com/umcheck?apnxid=8946887055383900570&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Request Chain 199
  • https://sd.turn.com/r/dd/id/L2NzaWQvMS9jaWQvMTc0ODI0MTY1OC90LzA/url/https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Famo_match%3Fturn_id%3D%24!%7BTURN_UUID%7D%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444 HTTP 302
  • https://ids.ad.gt/api/v1/amo_match?turn_id=8715615613836743585&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Request Chain 272
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=2031134372&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&ul=en-us&de=UTF-8&dt=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aCjAAUI7AAQC~&jid=152103421&gjid=982500115&cid=2007492185.1571681506&tid=UA-87198801-1&_gid=649671268.1571681507&_r=1&cd1=e37c7d18-d322-45ad-bc07-8149ef1d4444&cd2=none&cd4=arstechnica.com&cd5=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cd6=Passive%20Tagger&cd7=a56186a3a90da2fc5034afab463f7701&cd3=57&z=1322946017 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_gid=649671268.1571681507&gjid=982500115&_v=j79&z=1322946017 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_v=j79&z=1322946017 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_v=j79&z=1322946017&slf_rd=1&random=3084729033
Request Chain 286
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=2031134372&t=event&ni=1&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dr=%2F&dp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&ul=en-us&de=UTF-8&dt=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=video&ea=ad%20call&_u=aCjAAUI7AAQC~&jid=372130125&gjid=1830695398&cid=2007492185.1571681506&tid=UA-31997-1&_gid=113353096.1571681510&_r=1&gtm=2wgaa0NLXNPCQ&cg1=article%7Cfeature&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=133&cd4=&cd6=Mon%20Oct%2021%202019%2020%3A11%3A50%20GMT%2B0200%20(Central%20European%20Summer%20Time)&cd7=1571681510000.7mknxl1u&cd8=-2&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=GA%20Event%20-%20Video%20Ad&cd20=none&cd24=1&cd25=Peter%20Bright&cd26=679043&cd27=9055&cd28=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cd29=web&cd32=2015-08-26T01%3A00%3A56%2B00%3A00&cd34=2015-09-03T14%3A00%3A10%2B00%3A00&cd35=&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D679043&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cd93=information%20technology&cd98=article%7Cfeature&cd103=&cd113=video-ad-call&cd3=2007492185.1571681506&cd76=55d0d42c61646d257d000000%7CTech_Gear%20%26%20Gadgets%7C477%7C1.%20How%20Buffer%20Overflows%20work%3A%20the%20stack&cd77=arstechnica&cd79=0&cd80=1&cd82=55d0d42c61646d257d000000&cd83=Tech_Gear%20%26%20Gadgets&cd84=1.%20How%20Buffer%20Overflows%20work%3A%20the%20stack&cd85=477&cd90=arstechnica&cd91=1&z=1543815984 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_gid=113353096.1571681510&gjid=1830695398&_v=j79&z=1543815984 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_v=j79&z=1543815984 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_v=j79&z=1543815984&slf_rd=1&random=812752255

296 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
65 KB
21 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
90a90c36f6b8bdedd42be70c52db109971ca006b57c32f055ef3a804b9d60a10
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Mon, 21 Oct 2019 18:11:45 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web208
content-encoding
gzip
main-fda3363908.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
344 KB
72 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
eb4b7ea3462af2f864d876a8f2b89589e28de75ac9849c1a6291417df878ba2a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
72898
x-cf-tsc
1571305247
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
W/"5da4cf43-560ce"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10893
accept-ranges
bytes
x-cf-rand
0.266
expires
Mon, 16 Dec 2019 18:11:45 GMT
style.css
cdn.arstechnica.net/wp-content/themes/ars/assets/features/generic/
0
0
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/features/generic/style.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

access-control-allow-origin
*
gpt.js
www.googletagservices.com/tag/js/
46 KB
15 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
42d43df9871bea8939c3f1e36ed01412eee4479bfb1c9b4a5b6b5a3f909e1749
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"314 / 199 of 1000 / last-modified: 1571674022"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14734
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:45 GMT
apstag.js
c.amazon-adsystem.com/aax2/
77 KB
22 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.74.186 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-74-186.fra2.r.cloudfront.net
Software
Server /
Resource Hash
c02e2b06d9126930b67bf7d73a9537dd60aa430a345a9e2773b645807ef0b4ec

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 17:52:56 GMT
content-encoding
gzip
server
Server
age
1128
etag
9adec3ed0e2dfb55ea99831806416a28
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
x-amz-cf-id
VQOBEpRcNmVE0mNFnCLYzsVxeA7LqagO9W1Ugix38SnZScgHBVaCTA==
via
1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront)
183973-1558632223658.js
js-sec.indexww.com/ht/p/
116 KB
32 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4a64765dec5cd339627825bfc0dab7df162ec8de3588ce7273cda5bdfd414330

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Last-Modified
Mon, 21 Oct 2019 18:10:37 GMT
Server
Apache
ETag
"76135e-1ce08-5956f99c32d54"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
32219
Expires
Mon, 21 Oct 2019 19:11:45 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
85 KB
33 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
a4b1778a87595cf9ae9f5895ec53d8d0c7b14bcd2b8e83e97205de93d9e2d302

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Last-Modified
Fri, 14 Jun 2019 22:46:08 GMT
Server
AmazonS3
x-amz-request-id
51EAAEE1F3A29B96
ETag
"72a5c50e4e39e0e8cb0219a5569deff3"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63909
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
32968
x-amz-id-2
F2Qao5shCYQu5cyq2mkNzxqmDgSvsHK2qYzrkz+Di8nW/PuM/rPl05Z4Q7PUU1iE5krHHF6wvyU=
ars-technica.min.js
cdn.arstechnica.net/cns/
132 KB
43 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/ars-technica.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
a641143af073af304c2a59416f269a90f6c8520b63e60757b173a263efcf561a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
D49A19A04B321728
x-cf1
14961:fC.fra2:co:1570118644:cacheN.fra2-01:H
status
200
x-cache-hits
0
x-cf-tsc
1571310360
content-length
43652
x-amz-id-2
NSOMK87DP2/hS0+TeGoc/kp51QGtFJIz4kbMhZqxWyRlOHmkkTRg9SbQPfTCKxCyj6vBdmax8Pc=
x-served-by
cache-mdw17329-MDW
cf4ttl
43200.000
last-modified
Wed, 09 Oct 2019 18:53:23 GMT
server
CFS 0215
x-timer
S1571310360.077406,VS0,VE233
x-cff
B
etag
"fa8d177f3889042b037a66665872e42e"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5778
x-amz-version-id
usAI1.ut.QN1olpdoALg05UaQkX9_kaz
accept-ranges
bytes
x-cf-rand
1.830
expires
Mon, 16 Dec 2019 18:11:45 GMT
ars-bcfee6c82a.ads.us.js
arstechnica.com/wp-content/themes/ars/assets/js/
4 KB
2 KB
Script
General
Full URL
https://arstechnica.com/wp-content/themes/ars/assets/js/ars-bcfee6c82a.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
nginx
etag
W/"5da4cf43-e66"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
strict-transport-security
max-age=300
x-ars-server
web208
x-xss-protection
1; mode=block
buffer-overflow.jpg
cdn.arstechnica.net/wp-content/uploads/2015/08/
82 KB
83 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2015/08/buffer-overflow.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1da85050ab0b89d55be610c901b3ac65236f50f24cb85af475b7b10c096664e5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:M
status
200
content-length
84148
x-cf-tsc
1571636776
x-cf2
H
last-modified
Mon, 24 Aug 2015 17:54:41 GMT
server
CFS 0215
x-cff
B
etag
"55db5a61-148b4"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
0.078
expires
Mon, 16 Dec 2019 18:11:45 GMT
basic-stack-300x510.png
cdn.arstechnica.net/wp-content/uploads/2015/08/
16 KB
16 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2015/08/basic-stack-300x510.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
7cc83d349167df6dfcadd320bacf9d8cfae78464ebacaefd6f8d99fe5a1adf62

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:M
status
200
content-length
16358
x-cf-tsc
1571640877
x-cf2
H
last-modified
Fri, 14 Aug 2015 23:18:53 GMT
server
CFS 0215
x-cff
B
etag
"55ce775d-3fe6"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
0.419
expires
Mon, 16 Dec 2019 18:11:45 GMT
basic-stack-normal-usage-300x510.png
cdn.arstechnica.net/wp-content/uploads/2015/08/
17 KB
17 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2015/08/basic-stack-normal-usage-300x510.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
7afde96ac85f0923ae9832e62f7766124fa69ae3c0e8b79d770aab99772b3980

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:M
status
200
content-length
17193
x-cf-tsc
1571640877
x-cf2
H
last-modified
Fri, 14 Aug 2015 23:21:05 GMT
server
CFS 0215
x-cff
B
etag
"55ce77e1-4329"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
0.082
expires
Mon, 16 Dec 2019 18:11:45 GMT
visual-studio-980x339.png
cdn.arstechnica.net/wp-content/uploads/2015/08/
126 KB
127 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2015/08/visual-studio-980x339.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0b4cbad4c697d900c92b893c854d5c39ea7ff8bfcf9d9f057afe7a8f7e7c365d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:M
status
200
content-length
129056
x-cf-tsc
1571636777
x-cf2
H
last-modified
Fri, 14 Aug 2015 22:14:02 GMT
server
CFS 0215
x-cff
B
etag
"55ce682a-1f820"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
0.239
expires
Mon, 16 Dec 2019 18:11:45 GMT
gtm.js
www.googletagmanager.com/
275 KB
67 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
614f8554f632195e9af6133784d6e43c57328e20f8804a877b84483e76450f11
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
67952
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:45 GMT
integrator.js
adservice.google.de/adsid/
109 B
323 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
319 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2019101401.js
securepubads.g.doubleclick.net/gpt/
156 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
sffe /
Resource Hash
f8800772f0dd827877029d9d634a170a156ff82b6b6bdf251b62c750b73cfe93
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 14 Oct 2019 13:08:16 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
58589
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:45 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.74.186 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-74-186.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:06:23 GMT
content-encoding
gzip
vary
Origin
age
323
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Sat, 19 Oct 2019 18:03:24 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 27f665df26bde4a7226480b4a2890ff9.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
nngKzZNtr0y-Ad2JGk3wiwmER87rej9TkFaToCo2PVtQfUJHwB1dGg==
ads.js
arstechnica.com/hotzones/src/
0
517 B
XHR
General
Full URL
https://arstechnica.com/hotzones/src/ads.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-content-type-options
nosniff
last-modified
Mon, 14 Oct 2019 19:39:23 GMT
server
nginx
etag
"5da4ceeb-0"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-length
0
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
strict-transport-security
max-age=300
accept-ranges
bytes
x-ars-server
web208
x-xss-protection
1; mode=block
basic-stack-overflow-a-300x553.png
cdn.arstechnica.net/wp-content/uploads/2015/08/
28 KB
28 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2015/08/basic-stack-overflow-a-300x553.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
7e42de22d78a240c6081763bcb888d939a6b92b94186df13c3e548ace3eea8a5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:M
status
200
content-length
28793
x-cf-tsc
1571654403
x-cf2
H
last-modified
Fri, 14 Aug 2015 23:35:25 GMT
server
CFS 0215
x-cff
B
etag
"55ce7b3d-7079"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
13526
accept-ranges
bytes
x-cf-rand
1.311
expires
Mon, 16 Dec 2019 18:11:45 GMT
main-0dd987c70f.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
655 KB
213 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0dd987c70f.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
e5a043fbf588b5d5f693f9b3fe70ee7839ce1eb442b7589dce855d4250f1a53e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
217829
x-cf-tsc
1571310244
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-a3cb8"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5896
accept-ranges
bytes
x-cf-rand
2.603
expires
Mon, 16 Dec 2019 18:11:45 GMT
style.js
cdn.arstechnica.net/wp-content/themes/ars/assets/features/generic/
0
0
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/features/generic/style.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

access-control-allow-origin
*
widget.min.js
embed.actionbutton.co/widget/
53 KB
17 KB
Script
General
Full URL
https://embed.actionbutton.co/widget/widget.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.46 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-46.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
dfddb5a08bb174d7216b37cd929a894e3efe39a01636b620b1ad431a1f3d5ad1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Last-Modified
Fri, 11 Oct 2019 16:21:10 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA2-C2
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 1e498d046330e15095a1a2a958463bf5.cloudfront.net (CloudFront)
Cache-Control
no-cache
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
I9btzs7ZxOKodKXbteerldVRVDMX3MiSGQ9fkvjcfmiRWdfgNSi9pw==
topic_counts.php
arstechnica.com/civis/services/api/
26 B
26 B
Image
General
Full URL
https://arstechnica.com/civis/services/api/topic_counts.php?ids=1291957
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx
x-frame-options
SAMEORIGIN
content-type
text/html; charset=UTF-8
status
200
strict-transport-security
max-age=300
x-ars-server
web208
x-xss-protection
1; mode=block
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.177 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-177.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
28faefc7126edfb8b0ca9e210abece1cd7ba508b443b8e8d989693da82809265
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:10:47 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
8
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
27517
X-XSS-Protection
1; mode=block
X-Request-Id
24e103d8-d184-411c-a20a-0462fb55c47d
X-Runtime
0.010549
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"81fdd3b1e0b2a3136ee177910392f526"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 d41256fff4c52560b6f36cf42caee95d.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Pop
FRA2
X-Amz-Cf-Id
mJqy8B6M3zHMvrjOWahoF5ENS3XXVmMSW64mB1AIL59SwUEvJo4XJw==
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
cf-cache-status
HIT
age
5994
cf-ray
52953220d9a559fa-VIE
status
200
cf-ipcountry
DE
x-country
DE
content-length
2018
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1511466428 1511112401
via
1.1 varnish
cache-control
max-age=21600
accept-ranges
bytes
content-type
text/javascript
100098X1555750.skimlinks.js
s.skimresources.com/js/
38 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3bf16831676488c9e6ea4aea8db26893534895101a1244c58afc1e47d713d298

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
last-modified
Thu, 26 Sep 2019 09:09:20 GMT
server
AmazonS3
x-amz-request-id
19529CA59CD921E0
etag
"2399c9a458943c6d946ad4a55aa2dc85"
x-hw
1571681505.cds064.fr8.hn,1571681505.cds127.fr8.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15044
x-amz-id-2
alGX7J7n3wYa0ihjGeyFJbR0sBvafkU8LKFVlzPBG24tNEudpQfyjFZn1e710Bq76/+fqOC9kEI=
yi.js
mb.moatads.com/
1 KB
1 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_2352920
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.8.71.160 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-8-71-160.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
2d85a6b3b59c317999df5240b27391ee600b8223c20754f1daac4ac92b50b496

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
server
TornadoServer/4.5.3
etag
"c56bc749d593d4711cb653f7cb02799b59a06af9"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1146
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1571681505347&de=195549176379&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=7392b0f-clean&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&ac=1&bq=11&f=0&na=1196840775&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:45 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:45 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1571286841
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
29303
accept-ranges
bytes
x-cf-rand
3.606
expires
Mon, 16 Dec 2019 18:11:45 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1561917085
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1562205866
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20872
x-cf-tsc
1562205866
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
opensans-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c46974d8f6030e4888708b18a5d9a32b25eb765a5708896e1899df449d87aab7

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20748
x-cf-tsc
1562368559
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-510c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1562368897
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-fda3363908.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1562369864
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Mon, 16 Dec 2019 18:11:45 GMT
outbrain.js
widgets.outbrain.com/
106 KB
36 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1571681505450
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0dd987c70f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
afeff1f2f0929ace50d45341a1a1ecb3b4a8012b6ea1f45a8e9fd0d46db1219e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Last-Modified
Thu, 17 Oct 2019 08:24:25 GMT
Server
Apache
ETag
"e5db8321cc494210a94e16330d037521:1571303766"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
36707
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0dd987c70f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.155.118 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-155-118.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
e63b1da010fd0ae09966d8d1cb1d5a094faebea66a20c21b4f3e1c4c1abadd66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
658
X-XSS-Protection
1; mode=block
X-Request-Id
53076b31-4e8f-4898-a1e3-6ae101210e8f
X-Runtime
0.001895
X-Backend-Node
10.110.28.153
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"28cd4e87422f01de3e4182153a3a1d18"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
style.js
cdn.arstechnica.net/wp-content/themes/ars/assets/features/generic/
0
0
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/features/generic/style.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

access-control-allow-origin
*
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&t=1571681505347&de=195549176379&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=7392b0f-clean&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&ac=1&bq=11&f=0&zn=0&na=1327941180&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:45 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:45 GMT
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.215 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-215.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 01:42:21 GMT
Content-Encoding
gzip
Age
59365
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
ETag
"53191693-19c1"
Content-Type
application/x-javascript
Via
1.1 1d87c34bb2f20fda8e0841bc33179769.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
eWUgxb5FYy_Q_K1-vKOili45iqzJReoO6fpn3AUUDQfo_fE9nHTQ1g==
Expires
Tue, 22 Oct 2019 01:42:19 GMT
conde-nast
segment-data.zqtk.net/
723 B
994 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.0.5 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-0-5.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
e9a2a75eb86fdc28e7f2910fdc171d8bb554cd953d130e4998926019d8854b65

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Expires
Tue, 22 Oct 2019 13:38:35 GMT
Last-Modified
Sun, 20 Oct 2019 13:38:35 GMT
Server
nginx/1.10.3 (Ubuntu)
Connection
keep-alive
Content-Length
723
Content-Type
application/javascript; charset=UTF-8
ixmatch.html
js-sec.indexww.com/um/ Frame C687
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"e20015-112-55254ff6a1972"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Mon, 21 Oct 2019 18:11:45 GMT
Connection
keep-alive
ars-technica.config.js
pixel.condenastdigital.com/config/v2/production/
5 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/ars-technica.config.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a6a60bfeca1021496ac984a7e6b7f05f9473db17edcccbc91855b302863bab76

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Age
488923
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
995
x-amz-id-2
1VOF2yhQNTZO1qIp5jW5KhzfFEBiiyGcgO6xDZXv3TE5WRaZZuEkooWaunXyOFKDh3Xskof7QzU=
X-Served-By
cache-iad2135-IAD, cache-fra19129-FRA
Access-Control-Allow-Origin
*
Last-Modified
Fri, 12 Apr 2019 14:56:32 GMT
Server
AmazonS3
X-Timer
S1571681506.589456,VS0,VE0
ETag
"1be0f93ab87f7c023eae8fa152ea611f"
Vary
Accept-Encoding
x-amz-request-id
2E82BC22775206F1
Via
1.1 varnish, 1.1 varnish
Expires
Wed, 09 Oct 2019 07:32:14 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
1, 4187
id
dpm.demdex.net/
6 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1571681505592
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.241.149.220 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-241-149-220.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e0c557ff5196ab57117eab60d14541725b8ecec7ba4c7a4e298f7dce96efd410
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v048-07d75f3f0.edge-irl1.demdex.com 5.61.0.20191015084456 4ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
XFx3P/0kRVU=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
1598
Expires
Thu, 01 Jan 1970 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
2230
date
Mon, 21 Oct 2019 17:34:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Mon, 21 Oct 2019 19:34:35 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.203 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Last-Modified
Mon, 21-Oct-2019 18:11:45 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Mon, 28 Oct 2019 18:11:45 GMT
PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
698 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
3ce6aa359a1ab6d1a97a7ea066e6be363ba4a8bfbfa78896c7bc790a3db120f2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:45 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Content-Length
253
Content-Type
text/javascript;charset=UTF-8
fbevents.js
connect.facebook.net/en_US/
103 KB
23 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
9404cee30e4489a7ed4d6de2dd92aa8e4386fd5ff1c81ebcea77f581952eac31
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
22458
x-xss-protection
0
pragma
public
x-fb-debug
oTVUBY0EzyOtwlgePSLsKycCk790BQI9PYE/696784OMA/TLM4/Pq+k+/+BL+o0yzGkAjtdUUMwo29qTPXuIZw==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Mon, 21 Oct 2019 18:11:45 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
age
35901
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19123-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1571681506.631837,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
spm.v1.min.js
ak.sail-horizon.com/spm/
118 KB
42 KB
Script
General
Full URL
https://ak.sail-horizon.com/spm/spm.v1.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.106 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-106.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
a1b235023f47ff6443e3d54b34363f41f20bc92cf6a72be3e42e9f12fe72ddf6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:07:09 GMT
content-encoding
gzip
last-modified
Wed, 18 Sep 2019 19:01:40 GMT
server
Apache
age
280
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
cache-control
max-age=600; must-revalidate
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-length
43069
via
1.1 27f665df26bde4a7226480b4a2890ff9.cloudfront.net (CloudFront)
x-amz-cf-id
4DKQfVcUKpH-qAr7pAt0fFMatC-VAjbA2PxKmq7MzKPyrr_ykICdrQ==
i.js
tag.bounceexchange.com/2806/
9 KB
3 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.92.63 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
63.92.190.35.bc.googleusercontent.com
Software
fasthttp /
Resource Hash
0ccda4be7dc38d5c80c7529c268f04837165d504c74cbd43d36b923bbce1b776

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
server
fasthttp
etag
4c6805de5b7747
content-type
text/plain; charset=utf-8
status
200
cache-control
no-cache, must-revalidate
x-region
europe-west3
alt-svc
clear
content-length
3170
via
1.1 google
57
a.ad.gt/api/v1/u/matches/
3 KB
2 KB
Script
General
Full URL
https://a.ad.gt/api/v1/u/matches/57
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.165.247.37 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-165-247-37.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
7289411038db973dd8d329755b2e154596b82f2c073a4abdf10585d5108e249e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
1245
Content-Type
text/html; charset=utf-8
insight.min.js
snap.licdn.com/li.lms-analytics/
3 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=37990
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
beacon.js
www.medtargetsystem.com/javascript/
190 KB
56 KB
Script
General
Full URL
https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
90df158bd8069cfcb14a1ef88ebaa95bdd86a4ab8cb31e5aa8f1597f403cbc01

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Last-Modified
Mon, 21 Oct 2019 04:18:29 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"2f659-59563f9cfcf40-gzip"
Vary
X-Forwarded-Proto,Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57113
scevent.min.js
sc-static.net/
14 KB
6 KB
Script
General
Full URL
https://sc-static.net/scevent.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.45 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-45.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4d2e73fabea4a24a0278320a4920a5766ae7c7c5a11f787e0f31467a253bdddf

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 14:08:46 GMT
content-encoding
gzip
last-modified
Thu, 22 Aug 2019 01:24:21 GMT
server
AmazonS3
age
14580
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, s-maxage=86400, max-age=600
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
KnkC8pk3OJwzgyHZ3KuhH0ina_lQ1Gor6_2VL2EQYaQSLAm2KyvRcQ==
via
1.1 9128c49d19c76fd86ec4c647434ccb0a.cloudfront.net (CloudFront)
c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
optanon.blob.core.windows.net/consent/
136 KB
19 KB
Script
General
Full URL
https://optanon.blob.core.windows.net/consent/c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
394932783730f35682dbdd0827ee70afd0e4208ac0316d8c9199ad9b49605b9d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
GZIP
Last-Modified
Sat, 03 Aug 2019 21:36:58 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
zRwj6ElJPN1qBwE5S0GzGw==
ETag
0x8D7185AB64819F8
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
x-ms-request-id
97fe3c73-e01e-0057-043a-88316b000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
Cache-Control
public, max-age=14400
x-ms-version
2009-09-19
Content-Length
18308
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1571681505612&ns_c=UTF-8&c8=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.c...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1571681505612&ns_c=UTF-8&c8=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica....
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1571681505612&ns_c=UTF-8&c8=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&c9=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:45 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1571681505612&ns_c=UTF-8&c8=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&c9=
Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:45 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
95 B
340 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Mon, 21 Oct 2019 18:11:45 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
status
302
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
alt-svc
clear
content-length
0
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
95 B
351 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Mon, 21 Oct 2019 18:11:45 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
status
302
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
alt-svc
clear
content-length
0
/
prod-native.actionbutton.co/ Frame 0055
0
0
Document
General
Full URL
https://prod-native.actionbutton.co/?isNativeEmbed=true&3732f495-522a-494f-82bd-3404c383741c
Requested by
Host: embed.actionbutton.co
URL: https://embed.actionbutton.co/widget/widget.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:5800:11:8cf6:b500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
prod-native.actionbutton.co
:scheme
https
:path
/?isNativeEmbed=true&3732f495-522a-494f-82bd-3404c383741c
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
content-type
text/html
date
Mon, 21 Oct 2019 17:52:13 GMT
last-modified
Mon, 21 Oct 2019 17:52:03 GMT
cache-control
max-age=31536000,public
server
AmazonS3
content-encoding
gzip
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA2
x-amz-cf-id
S27qhf47On3fpLHIiLm__7-H-EnWUbpvPLEDkEoyL6eFsVCxbjZzhA==
age
1165
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DQQR94CVC07PCMGD9THHRV12&persistence=1&checksum=fb6cd1817924c61a950d1f493916d5963397137566b863742080a708f610d914
152 B
459 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DQQR94CVC07PCMGD9THHRV12&persistence=1&checksum=fb6cd1817924c61a950d1f493916d5963397137566b863742080a708f610d914
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
9c512c11d7efe0ea9a959346a0850b19dbec72c21ac2c6373875b0dfd9f84f5f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google

Redirect headers

date
Mon, 21 Oct 2019 18:11:45 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DQQR94CVC07PCMGD9THHRV12&persistence=1&checksum=fb6cd1817924c61a950d1f493916d5963397137566b863742080a708f610d914
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
px.gif
p.skimresources.com/
43 B
472 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=10.759235643629625
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Mon, 21 Oct 2019 18:11:45 GMT
x-guploader-uploadid
AEnB2UpeKNbumUpgBfi3X2tGggjUzG8yt8hFcEtVCxWMepUCjGAPJyLZEEZynJbjl6k8OImv4K3B4d8nwDo5fXau0SCfGlVRlg
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1571681505.cds064.fr8.hn,1571681505.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=10.759235643629625
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Mon, 21 Oct 2019 18:11:45 GMT
x-guploader-uploadid
AEnB2UpeKNbumUpgBfi3X2tGggjUzG8yt8hFcEtVCxWMepUCjGAPJyLZEEZynJbjl6k8OImv4K3B4d8nwDo5fXau0SCfGlVRlg
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1571681505.cds064.fr8.hn,1571681505.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
55d0d42c61646d257d000000.js
player.cnevids.com/inline/video/
56 KB
19 KB
Script
General
Full URL
https://player.cnevids.com/inline/video/55d0d42c61646d257d000000.js?iu=/3379/ars.dart&autoplay=0&muted=0&target=ars-cne-vid-1206900623&onReady=ARS_CNE_VIDEO_319808336
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0dd987c70f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.177 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-177.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
e041a4e5c76336ae9f88d266db44495395da19c6a67f11ab6785510e001ec443
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
18653
X-XSS-Protection
1; mode=block
X-Request-Id
e56d50f2-91e1-49b1-b006-fe8638b9aa72
X-Runtime
0.005799
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"0832570f1d1baf5f6abf810fdf602a28"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 d41256fff4c52560b6f36cf42caee95d.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
Jp92SC2ydhT3emAdhPUh1gSQUvRTwIqWTDgugQy2DhmMHJOATrvBCw==
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pID=&sID=&uId=&xid=&_ts=2019-10-21T18%3A11%3A45.709Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22unsupported%20template%22%2C%22pageTemplate%22%3A%22article%7Cfeature%22%2C%22url%22%3A%22information-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%22%7D&dim3=Availability%3A%20unsupported%20template
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:46 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
plugin.js
plugin.mediavoice.com/
330 KB
123 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c063623bde6fddcc704653915f8ffcdf11cb0da8304caccaf224f87e8ced84b1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
cf-cache-status
HIT
age
15275
status
200
content-type
application/javascript
content-length
125329
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Sat, 19 Oct 2019 01:56:39 GMT
server
cloudflare
etag
W/"5daa6d57-527f3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
x-varnish
2105317422 2105317338
via
1.1 varnish
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
52953222db4359fa-VIE
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Tue, 22 Oct 2019 01:56:45 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
584 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=86400
x-country
DE
cf-ray
529532231aff8c62-VIE
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=44&t=1571681505347&de=195549176379&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=7392b0f-clean&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=365&zMoatAllDataLoadTime=365&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&ac=1&bq=11&f=0&zn=0&if=365&na=1368088398&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:45 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:45 GMT
ads
securepubads.g.doubleclick.net/gampad/
424 B
708 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2983342256337245&correlator=2237722942949477&output=ldjh&impl=fifs&adsid=NT&eid=21062453%2C21064372%2C21064550&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191021&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dhow-security-flaws-work-the-buffer-overflow%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1571681505&dt=1571681505756&dlt=1571681505246&idt=319&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=0&adks=2746652139&ucis=1&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dssz=62&icsg=563674745929728&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x1&msz=1585x1&ga_vid=2007492185.1571681506&ga_sid=1571681506&ga_hid=2031134372&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
4146704de4673d5269e1e629f4ff6b6064439c9c97bf6633d6c840f57a64c4d5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
216
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019101401.js
securepubads.g.doubleclick.net/gpt/
64 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
sffe /
Resource Hash
f123fae1ceff20dea7ee2ff8895276a22cddecc8e0ef503b5e95419e76909a54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 14 Oct 2019 13:08:16 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24836
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:45 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-35/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-35/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1571681505450
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=17455
Date
Mon, 21 Oct 2019 18:11:45 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Mon, 21 Oct 2019 23:02:40 GMT
Cookie set dest5.html
condenast.demdex.net/ Frame 5BF7
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.240.220.248 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-240-220-248.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=62679995799542354163685637680468357518
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 16 Oct 2019 08:54:45 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=62679995799542354163685637680468357518;Path=/;Domain=.demdex.net;Expires=Sat, 18-Apr-2020 18:11:45 GMT;Max-Age=15552000
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
PdQWJcptS58=
Content-Length
2764
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
689 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=3.3.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=62470400838770700173705224728269208919&ts=1571681505810
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
3db171164331bd9c43ea9d4928b9b55c30192c7422207f8ec69c071db72fa9e5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www85
Vary
Origin
X-C
ms-6.11.2
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
X-XSS-Protection
1; mode=block
ibs:dpid=411&dpuuid=Xa304QAAFRhnohN_
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=62679995799542354163685637680468357518
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xa304QAAFRhnohN_
42 B
840 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xa304QAAFRhnohN_
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.241.149.220 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-241-149-220.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v048-09f04208b.edge-irl1.demdex.com 5.61.0.20191015084456 4ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-TID
ggARE4k+QSE=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=Xa304QAAFRhnohN_
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
1010 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 17:28:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
2590
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
856
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:28:35 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
484 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
228464857488266
connect.facebook.net/signals/config/
281 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/228464857488266?v=2.9.5&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
5b54922ea8d9acf20475c8ea563bfb8874a5ca0246bbf12bbfdd92590afd5c7c
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
66297
x-xss-protection
0
pragma
public
x-fb-debug
s2TVQTEvxyXG0VG0dwpl2rJvOch+fVBz2X3st5K+Rq9KgI/HFpPsFR03Gw+50x0G1f2Ll5v24wsN93QCFWB2Wg==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Mon, 21 Oct 2019 18:11:45 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aece3989759ce8b9a715ba342a604316f14a06ff35d5d4ee0cb5c7dfc8bbecc6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:45 GMT
Content-Encoding
gzip
Age
267865
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
13266
x-amz-id-2
G22jDR/T8Gn5E/DpiqgzExuok1rN1IkBMU610B7kk+5zBa3VSyC9OSc2tGwSwko2nJI4oLiZ+R8=
X-Served-By
cache-iad2148-IAD, cache-fra19129-FRA
Access-Control-Allow-Origin
*
Last-Modified
Fri, 26 Jul 2019 15:47:25 GMT
Server
AmazonS3
X-Timer
S1571681506.880779,VS0,VE0
ETag
"dba402ad6593e4f796c1bbad29c3e81e"
Vary
Accept-Encoding
x-amz-request-id
DEC7F0F62070489D
Via
1.1 varnish, 1.1 varnish
Expires
Fri, 26 Jul 2019 21:47:24 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
1, 7962
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1571681505875
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
ads
securepubads.g.doubleclick.net/gampad/
7 KB
4 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2983342256337245&correlator=2237722942949477&output=ldjh&impl=fifs&adsid=NT&eid=21062453%2C21064372%2C21064550&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191021&iu_parts=3379%2Cars.dart%2Cinformation-technology&enc_prev_ius=0%2F1%2F2&prev_iu_szs=300x140&prev_scp=pos%3Dsponsor%26ctx_slot_type%3Dnative_xrail%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnative_xrail_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dhow-security-flaws-work-the-buffer-overflow%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1571681505&dt=1571681505884&dlt=1571681505246&idt=319&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=786&adks=1840483542&ucis=3&ifi=3&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dssz=65&icsg=140918699065344&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x0&msz=300x140&ga_vid=2007492185.1571681506&ga_sid=1571681506&ga_hid=2031134372&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
e90cb90ecb7926834f6fd4a59ac9c3f880857c1af02cccc7f85f9201410c69f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:45 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
3347
x-xss-protection
0
google-lineitem-id
4736014287
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138237302059
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
rules-p-Jjy-Cyr1NZGRz.js
rules.quantcount.com/
4 KB
2 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-Jjy-Cyr1NZGRz.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2200:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 03:31:50 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:18:17 GMT
server
AmazonS3
x-amz-cf-pop
FRA50-C1
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-id
QUYKu0-eImPN6XeOZt8xf4CIq4lop-OqGg5ldK512sTBKhIQyFxyfA==
via
1.1 d55780b776b171387055eca956ae29a9.cloudfront.net (CloudFront)
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
343 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1571681505965&sessionId=a1320b95-39b9-4989-4822-aa9e36f92485&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1571681505450
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:46 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
f80cdf2fd06bd9c2319fe1ff4b7f408
Content-Length
4
Expires
0
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&time=1571681505967
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D434737%26url%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&time=1571681505967&...
0
90 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&time=1571681505967&liSync=true
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
zymDzwC8zxXwIGj2OCsAAA==

Redirect headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
x+C9ugC8zxWQSAvGjCsAAA==
server
Play
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&time=1571681505967&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
ijs_all_modules_d69e5cee1bb28009159dc29dcdf2cad4.js
assets.bounceexchange.com/assets/smart-tag/versioned/
347 KB
87 KB
Script
General
Full URL
https://assets.bounceexchange.com/assets/smart-tag/versioned/ijs_all_modules_d69e5cee1bb28009159dc29dcdf2cad4.js
Requested by
Host: tag.bounceexchange.com
URL: https://tag.bounceexchange.com/2806/i.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.98.72.95 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
95.72.98.34.bc.googleusercontent.com
Software
UploadServer /
Resource Hash
61d6331496619d60a04b895636cc2db8fd1cf3f42d84721b8632f938648a0d71

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 18 Oct 2019 08:24:40 GMT
content-encoding
gzip
age
294425
x-guploader-uploadid
AEnB2UraRsdkIRWyUc83DfwGLdxCvEVJNchtx09pFaOXtG8oT28Ml3YSzVy4Cw1KgJLr6s23B8kE0Uy78AYTxHK7mQlgWFgGow
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
1
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
88597
last-modified
Tue, 08 Oct 2019 17:56:42 GMT
server
UploadServer
etag
"5fe788842e5fc3a77266e32ae5d6002a"
vary
Accept-Encoding
x-goog-hash
crc32c=LEthAA==, md5=X+eIhC5fw6dyZuMq5dYAKg==
x-goog-generation
1570557402368012
access-control-allow-origin
*
cache-control
public,max-age=31536000
x-goog-stored-content-length
88597
accept-ranges
bytes
content-type
text/javascript
expires
Sat, 17 Oct 2020 08:24:40 GMT
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
44 KB
8 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0dd987c70f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.155.118 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-155-118.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
ca2a9c9b370cb90986b0dd715198e0b4445eea0ca984f520fb988d00b1de6976
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
7336
X-XSS-Protection
1; mode=block
X-Request-Id
d35d553f-5f16-4c0f-a362-e05899f84e20
X-Runtime
0.002702
X-Backend-Node
10.110.10.11
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"0ed8d782446aabe1d27a7021379af07f"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
arstechnica.com
srv-2019-10-21-18.config.parsely.com/config/
448 B
866 B
Script
General
Full URL
https://srv-2019-10-21-18.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.176.61 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-176-61.compute-1.amazonaws.com
Software
/ Express
Resource Hash
f5c2e7333aa9200c80ccad535e218065102ea75d86480ab96f2e82e5a884253c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Cache-Control
private, no-cache
ETag
W/"1c0-vdcQpnWel0U+9BDJRMz+Ug"
Connection
keep-alive
X-Powered-By
Express
Content-Length
448
Content-Type
text/javascript; charset=utf-8
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=55d0d42c61646d257d000000&iu=%2F3379%2Fars.dart&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/inline/video/55d0d42c61646d257d000000.js?iu=/3379/ars.dart&autoplay=0&muted=0&target=ars-cne-vid-1206900623&onReady=ARS_CNE_VIDEO_319808336
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.177 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-177.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
58e480745bfaaafb58ecda84bc32dfaf95233f75305bf085247f8447da7eb7cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2
X-Cache
Miss from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2016
X-XSS-Protection
1; mode=block
X-Request-Id
7c78b077-9b4f-4421-b7fa-c660bd8f6308
X-Runtime
0.216273
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"c00817278a28e668d0932ee232ed7e4a"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
lZ383HpTXi9CM9_tOTTG7E5aB5QOVqrs7bsTFkd9F0eUxurSyYUisw==
ima3.js
imasdk.googleapis.com/js/sdkloader/
271 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/inline/video/55d0d42c61646d257d000000.js?iu=/3379/ars.dart&autoplay=0&muted=0&target=ars-cne-vid-1206900623&onReady=ARS_CNE_VIDEO_319808336
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0765787f1966c35a86910225b871ca49249be9e882aade8899d624b431e7446b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
94100
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:46 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/inline/video/55d0d42c61646d257d000000.js?iu=/3379/ars.dart&autoplay=0&muted=0&target=ars-cne-vid-1206900623&onReady=ARS_CNE_VIDEO_319808336
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 05 Jun 2019 16:07:32 GMT
Content-Encoding
gzip
Age
11930655
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 f51b809c33f0bb5b1d5504f4df0c0a3f.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
X-Amz-Cf-Id
VtZTy67hc8LnbG_EqrSPUtBVurThMb_2CG7G0VzC2BB67yC6kzyxWg==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-cab2b85e1b200eef70e6.js
d2c8v52ll5s99u.cloudfront.net/player/
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/inline/video/55d0d42c61646d257d000000.js?iu=/3379/ars.dart&autoplay=0&muted=0&target=ars-cne-vid-1206900623&onReady=ARS_CNE_VIDEO_319808336
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ccdae88a27f5cdd02c7c8e2525a1eeca05eb0a1cf0efd524379091a7ed2a6ede

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 15 Oct 2019 20:17:06 GMT
Content-Encoding
gzip
Age
510827
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234888
Last-Modified
Thu, 10 Oct 2019 18:39:09 GMT
Server
AmazonS3
ETag
"ba04c8e2bdec7ec3d534dc59cce1c2f4"
Content-Type
application/javascript
Via
1.1 7a5407bd3564d5f8494603c5f2d0661f.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
X-Amz-Cf-Id
rvHG3fkGQAAb7YbVVvfd3d_-7xRnsK71hEURjK5APJPmY-B8PY4Lvw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
413 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1571681505347&de=195549176379&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=7392b0f-clean&zMoatDfpSlotId=_out_of_page_0&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=1&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=365&zMoatAllDataLoadTime=365&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&ac=1&bq=11&f=0&zn=0&if=365&na=1920889819&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:46 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:46 GMT
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1571681506067
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.29.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-29-231.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
b2f3d844adc76b37ce44edf6b2cce678df7e570921ec7c6a6f30ccf754903d5a

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.179.81 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-179-81.compute-1.amazonaws.com
Software
/
Resource Hash
f118c1d52a40d5c65c4f7243b89f234f2e62ecbcd517f04d8159aa159acfbe1e

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A46.068Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9400&pSw=1600&pSh=1200&uID=87dd16ff-e474-427b-91f0-d0582ff6f4d2&uNw=1&uUq=1&sID=f5f561c8-ba52-41f2-8b19-aa13f627c05f&pID=2475f86c-fd58-47de-883c-b22dc3b4abb5&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681506055%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22_Fu1sMXSWr5d_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:46 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
adsct
t.co/i/
43 B
447 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1o49&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
121
pragma
no-cache
last-modified
Mon, 21 Oct 2019 18:11:46 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
a11f08005535ab1c2a6aac3fc1c4a4ac
x-transaction
0087d0b1004b1149
expires
Tue, 31 Mar 1981 05:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 9D18
0
75 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvj9mKT2AWLCHJ2OAP3oZbP9j9MBkAKigKNfEOe_bb3ItaypWuZkjAkuAEMUD3OoKbwkUEBrIxSZmrjC34KwTHD-M5tbAt1bT3nxh0_AYRBtwgEB70k-YtZ2ly5T65PIFrjn0ENqeAY8Ow0hDtuup-OfxmsSuGeFnTxu-PYkRPDz1ijg_EDVVNEGXLhHyiVDqQ8PW24I4DyHGQGIjhrqeK6byad1cp83qmPt5kltNPv-R7uH_rrME47nUYbi7NhEXmENSv076JaeXxwpZZ8ND00mfFL&sig=Cg0ArKJSzOS655Tv5JaDEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:46 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
creative.js
static.polarcdn.com/creative/ Frame 9D18
311 KB
118 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f87e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c52cb7e2518372600445005ba03da94e190cad0bc51fa569013903b9d165f4eb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
cf-cache-status
HIT
age
3355
cf-ray
5295322598278c7a-VIE
status
200
cf-ipcountry
DE
content-type
application/javascript
content-length
120180
access-control-allow-origin
*
last-modified
Sat, 19 Oct 2019 02:12:57 GMT
server
cloudflare
etag
W/"5daa7129-4db2d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
x-varnish
485328461 485327959
via
1.1 varnish
access-control-expose-headers
CF-IPCountry
cache-control
max-age=10800
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Mon, 21 Oct 2019 20:15:34 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 9D18
77 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f820f689e79fe927155372514936423b30eb400c1d2b87b6503d1398f6d352c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1571051767941600"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29551
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:46 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame 9D18
295 KB
98 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d14b7ac07d9d07677f62a0f5c76ac8a49dc6577aabb40c11314ac779754dd464

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 00:50:48 GMT
Server
AmazonS3
x-amz-request-id
C3B4CFE8500C8079
ETag
"dbc4d2b7ee7d1f236903b70daaed2bcf"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63677
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
100316
x-amz-id-2
Rt/8JdCOSpHR33nmrksy/4bzijHa/5pMFQ+pteWuIncoCo/P3vMDHbS77DIosNrxRRq+nhOQKtw=
osd.js
www.googletagservices.com/activeview/js/current/
77 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f425f66d90f1150499b36ab47b56fa6fb1a68136e4f42befca20a920ff85306b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1571051767941600"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29055
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:46 GMT
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
494 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.1454517775.Campaign%20ID.2338761482.Line%20Item%20ID.4736014287
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.223 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:46 GMT
Server
QS
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A46.098Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9400&pSw=1600&pSh=1200&uID=87dd16ff-e474-427b-91f0-d0582ff6f4d2&sID=f5f561c8-ba52-41f2-8b19-aa13f627c05f&pID=2475f86c-fd58-47de-883c-b22dc3b4abb5&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fars.dart%2Finformation-technology%22%2C%22advertiserId%22%3A1454517775%2C%22campaignId%22%3A2338761482%2C%22creativeId%22%3A138237302059%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A4736014287%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x140%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681506098%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22sponsor%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22_Fu1sMXSWr5d_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:46 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame 4EEC
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

status
200
date
Mon, 21 Oct 2019 18:11:46 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=d61d138b937abe0bd15e63afd488267091571681506; expires=Tue, 20-Oct-20 18:11:46 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1512124521 1512123934
via
1.1 varnish
cf-cache-status
HIT
age
368
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5295322588fb59d0-VIE
i
tr.snapchat.com/cm/ Frame 0E2C
0
0
Document
General
Full URL
https://tr.snapchat.com/cm/i?
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx/1.17.3 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
GET
:authority
tr.snapchat.com
:scheme
https
:path
/cm/i?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
server
nginx/1.17.3
date
Mon, 21 Oct 2019 18:11:46 GMT
content-type
text/html
content-length
0
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
/
www.facebook.com/tr/
44 B
347 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=PageView&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&rl=&if=false&ts=1571681506171&cd[SiteSection]=information%20technology&cd[PageTags]=&cd[Brand]=Pitchfork&sw=1600&sh=1200&v=2.9.5&r=stable&ec=0&o=30&fbp=fb.1.1571681506169.1257070335&it=1571681505865&coo=false&rqm=GET
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Mon, 21 Oct 2019 18:11:46 GMT
publishertag.js
static.criteo.net/js/ld/
86 KB
27 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.130 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
34c0194deac635fd02a300e11745a72d36b67bddefe58e02de53f5ffd2f70381

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
last-modified
Thu, 10 Oct 2019 07:51:03 GMT
server
nginx
etag
W/"5d9ee2e7-159ee"
status
200
content-type
text/javascript
access-control-allow-origin
*
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Tue, 22 Oct 2019 18:11:46 GMT
ids
mid.rkdms.com/
0
0

identity
api.rlcdn.com/api/
0
0

rid
match.adsrvr.org/track/
109 B
535 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.49.48.201 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-49-48-201.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
1980df33b126025d11b83a6c67c446c9b57069e427774569c0ef3b763978a090

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Wed, 20 Nov 2019 18:11:46 GMT
5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady26487458
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady26487458
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0dd987c70f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.177 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-177.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
95d95e4798fa8db6b11b9981a32e1257c8ed8afa80f58c0dd52b4623fa3012f9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
20735
X-XSS-Protection
1; mode=block
X-Request-Id
334d540a-cf1a-41b9-9a9d-550ef265d884
X-Runtime
0.006491
X-Backend-Node
10.110.45.152
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"999b567b134ef9546be0b8f3e4729a4a"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 d41256fff4c52560b6f36cf42caee95d.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
G19xGOPn5wQNlsl24icaB5WUPeLbKeYMuNE3iQ7J70iYoGIkSFFO6A==
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 16:41:11 GMT
Via
1.1 varnish, 1.1 28edd995979e84232ebdb595b33d9deb.cloudfront.net (CloudFront)
Age
232819
Edge-Cache-Tag
390602458176548494884398897259766670181,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16236
X-Request-Id
e42c1874c2a1e572
X-Served-By
cache-fra19144-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 11:27:54 GMT
Server
cloudinary
X-Timer
S1569256871.872536,VS0,VE299
ETag
"72002610618f7bf8bf0e52c760e39897"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
R1agNKwbk8_n-ce1nYa9u0-z8wMZcCRoN4XKAWtma2jFPyahbJnAtw==
X-Cache-Hits
0
arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/
11 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 15 Oct 2019 14:33:29 GMT
Via
1.1 varnish, 1.1 8602503af95a7bac32a020063ca51410.cloudfront.net (CloudFront)
Age
231569
Edge-Cache-Tag
285695674967648002297586464606017083075,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10793
X-Served-By
cache-fra19156-FRA
Last-Modified
Tue, 17 Sep 2019 19:55:15 GMT
Server
cloudinary
X-Timer
S1571150009.019081,VS0,VE1
ETag
"0e1ff58ccf6d97759de3d774a7ff835a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
qIWKTbsmiC23IdSAL_vffzUrd0HnJJV-lmJ3hKpFNh5jaffG-9QCYw==
X-Cache-Hits
1
arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
5f760e6eaa1fd8e199a7135ae74692369612ff5de37b99eb63bcb8ee7d615568

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 19 Jul 2019 15:13:14 GMT
Via
1.1 varnish, 1.1 9de9a776d0da209cb66ec4bd03877799.cloudfront.net (CloudFront)
Age
356158
Edge-Cache-Tag
512786565011436188602690990842551442357,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16016
X-Request-Id
558da5101eeb1f1f
X-Served-By
cache-fra19150-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 19 Jul 2019 15:13:07 GMT
Server
cloudinary
X-Timer
S1563549194.385414,VS0,VE180
ETag
"4dba8e36b73a44cca8375175ae0e4b39"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
g3cY6mrlEcOn_gvlcfmKxIj31KHOdppW78WMHsUoBIcf5SCx4120Cg==
X-Cache-Hits
0
arstechnica_warframe-reviews.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/arstechnica_warframe-reviews.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 27 Jun 2019 19:35:11 GMT
Via
1.1 varnish, 1.1 7e6ac12144acebd1fc302708f2ecfad6.cloudfront.net (CloudFront)
Age
2198806
Edge-Cache-Tag
409825722100045817936218917770258862228,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14837
X-Request-Id
b6ad3868f2bf03bf
X-Served-By
cache-hhn4083-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 27 Jun 2019 19:34:59 GMT
Server
cloudinary
X-Timer
S1561664111.929725,VS0,VE147
ETag
"1d90d6aef7585f963e1270a1a02a4dd4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
x1c99Pp7S25wq6WQ-6mC9Oy-18DcklVDEYLp1eeisuT4pC2Mz2qpxA==
X-Cache-Hits
0
arstechnica_war-stories-subnautica.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/arstechnica_war-stories-subnautica.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 20 Oct 2019 01:12:55 GMT
Via
1.1 varnish, 1.1 ea71ce4ac4724c3ed76f4816ddddaa6c.cloudfront.net (CloudFront)
Age
147531
Edge-Cache-Tag
384957005148579205807938476483146982592,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15222
X-Request-Id
38edb11f9248385d
X-Served-By
cache-hhn1545-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 05 Jun 2019 17:40:02 GMT
Server
cloudinary
X-Timer
S1559957411.386117,VS0,VE1
ETag
"8c45b6c645caba59f4b14d3fbdc09062"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
SiiW56dvDDUGSO3QAUucXpTQP1KGHzv2lYWfEhfzpyaS1Su5H-RNMw==
X-Cache-Hits
1
arstechnica_this-war-of-mine-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/
16 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/arstechnica_this-war-of-mine-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
ec84902ae04cc118d965c577e2ece816abd594431ce66bcef1afd4f745e951fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 20 Oct 2019 01:12:55 GMT
Via
1.1 varnish, 1.1 8602503af95a7bac32a020063ca51410.cloudfront.net (CloudFront)
Age
147531
Edge-Cache-Tag
580474366038461196493179311799260666459,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15985
X-Request-Id
c8c7238dbb15b70b
X-Served-By
cache-hhn1542-HHN
Last-Modified
Mon, 03 Jun 2019 18:11:08 GMT
Server
cloudinary
X-Timer
S1559585468.501454,VS0,VE505
ETag
"42bc7816573b81a73647b6f7123944c5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
WTKFdztme-N8M-A8_ZR8OvLQ3yGjl-ijoqsWbvFmgVhmJoxTKGfDhQ==
X-Cache-Hits
0
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 28 May 2019 17:37:15 GMT
Via
1.1 varnish, 1.1 9de9a776d0da209cb66ec4bd03877799.cloudfront.net (CloudFront)
Age
1545544
Edge-Cache-Tag
433557846635605494688582207268998106147,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15609
X-Request-Id
c8a15984885b6e84
X-Served-By
cache-fra19142-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 28 May 2019 17:36:10 GMT
Server
cloudinary
X-Timer
S1559065035.044774,VS0,VE231
ETag
"8becb0d5f4f7ff3e76e89c89871f465d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
75E1pyU8Zk7fZDeL8fAyN6jiG0Jb4YwYGxqDLUNOuXnweyuITDUjeQ==
X-Cache-Hits
0
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:09:44 GMT
Via
1.1 varnish, 1.1 7e6ac12144acebd1fc302708f2ecfad6.cloudfront.net (CloudFront)
Age
231568
Edge-Cache-Tag
575077299308468417590234438077035908298,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7863
X-Request-Id
19c9873a9e40bdc6
X-Served-By
cache-hhn1537-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 13 May 2019 19:11:27 GMT
Server
cloudinary
X-Timer
S1559434184.442899,VS0,VE232
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
ur__HurJB0kW4Fp6qyOIBUhhIEww1RFL9CoVBPQFb-eX1O4zsNrytg==
X-Cache-Hits
0
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:05:34 GMT
Via
1.1 varnish, 1.1 8602503af95a7bac32a020063ca51410.cloudfront.net (CloudFront)
Age
3036415
Edge-Cache-Tag
515397136805965062020045600075132664421,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15634
X-Request-Id
2d0da7ec326501f4
X-Served-By
cache-fra19145-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
cloudinary
X-Timer
S1559088335.611581,VS0,VE1
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
ZE3gCLTB0kiudf5ujcYo4wh54nTyYZgfV0TzGB1sN9-MkalGktEoug==
X-Cache-Hits
1
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 21 May 2019 00:08:37 GMT
Via
1.1 varnish, 1.1 28edd995979e84232ebdb595b33d9deb.cloudfront.net (CloudFront)
Age
1532577
Edge-Cache-Tag
587193118310891607619753694455047488726,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15251
X-Request-Id
4a753e904b5f7094
X-Served-By
cache-hhn1539-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
cloudinary
X-Timer
S1558397317.096357,VS0,VE232
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
1pa8GX9CpItjZa7gy3KztHIwwIJjc9C1gM1JIJ7XH9qfLQ0CwwtoKA==
X-Cache-Hits
0
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 28 May 2019 01:29:38 GMT
Via
1.1 varnish, 1.1 9de9a776d0da209cb66ec4bd03877799.cloudfront.net (CloudFront)
Age
2345398
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
2200c349462f9c83
X-Served-By
cache-hhn1528-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1559006978.808642,VS0,VE226
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
W9-jgpXSwJNrzU9dATmkUfY_rGasUxpStYcEr2iE26Y0EdDY7uBilA==
X-Cache-Hits
0
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:18:27 GMT
Via
1.1 varnish, 1.1 28edd995979e84232ebdb595b33d9deb.cloudfront.net (CloudFront)
Age
214761
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
e3f346bec24d7ff3
X-Served-By
cache-hhn1532-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1559089107.834583,VS0,VE286
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
zdiQ1TXBoogMe9KpBLI4SNuJrfU-dHVOEFg0o7ajJe8CBrHv_g0hxg==
X-Cache-Hits
0
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:11:29 GMT
Via
1.1 varnish, 1.1 8602503af95a7bac32a020063ca51410.cloudfront.net (CloudFront)
Age
2345398
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
c3e7d96bbe014b80
X-Served-By
cache-hhn1535-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1559088690.594713,VS0,VE388
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
MAcCECDKIiP6cnNRacbJoUaD3XQOO5YlMUWiIAJezrHyj096bgPjKg==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 18 Jul 2019 00:09:15 GMT
Via
1.1 varnish, 1.1 7e6ac12144acebd1fc302708f2ecfad6.cloudfront.net (CloudFront)
Age
2740294
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-hhn4057-HHN
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1563408556.813889,VS0,VE1
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
rJFc3eER5OJy2fKclOCnXvstso_7VqW7Ghwxh2EbjqfJGH7PEVfm5A==
X-Cache-Hits
1
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 22 Sep 2019 18:49:07 GMT
Via
1.1 varnish, 1.1 9de9a776d0da209cb66ec4bd03877799.cloudfront.net (CloudFront)
Age
1900577
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
988c071c5dc1dbcd
X-Served-By
cache-fra19174-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1569178147.036167,VS0,VE1
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
tLjXp5Ue2XswSF4ptexujEOy1_QxjeVPFxSSm-dMxyqpM8VwgsBNog==
X-Cache-Hits
1
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 03 Oct 2019 00:13:56 GMT
Via
1.1 varnish, 1.1 28edd995979e84232ebdb595b33d9deb.cloudfront.net (CloudFront)
Age
833495
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
084e33e1bdc5af39
X-Served-By
cache-hhn4040-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1570061636.390979,VS0,VE1
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
qHdJ6VJ21u02YOFe4Mg7ITxpIc0ccQLAKwD2bmZUAvw75qfSog7PGg==
X-Cache-Hits
1
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 20 May 2019 18:19:04 GMT
Via
1.1 varnish, 1.1 7e6ac12144acebd1fc302708f2ecfad6.cloudfront.net (CloudFront)
Age
2517050
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-fra19129-FRA
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1558376344.111767,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
YYXeVJmTnB1dwFu1Wfe_1N5znWTl-uHad6me6V-DtUZHwi2rfeylZw==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 30 Sep 2019 00:26:08 GMT
Via
1.1 varnish, 1.1 8602503af95a7bac32a020063ca51410.cloudfront.net (CloudFront)
Age
851702
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
df58045e81c658a9
X-Served-By
cache-fra19182-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1569803169.886090,VS0,VE1
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
OgqKlxxqyL242dday_WhLU-CDpWpmns-CO1muCCwLBC513vtYXFzYA==
X-Cache-Hits
1
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 21 May 2019 00:22:17 GMT
Via
1.1 varnish, 1.1 9de9a776d0da209cb66ec4bd03877799.cloudfront.net (CloudFront)
Age
857859
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
50cb21064027ad75
X-Served-By
cache-hhn1541-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1558398138.789238,VS0,VE1
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
SzzgrWWCZrNn4COlotX8uBavZCY_700x0XKnqjWdcFtxGqaN8HJgWA==
X-Cache-Hits
1
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
collect
www.google-analytics.com/
35 B
197 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=2031134372&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dr=%2F&dp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&ul=en-us&de=UTF-8&dt=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aChAgUAjAAQC~&jid=452238025&gjid=443737167&cid=2007492185.1571681506&tid=UA-31997-1&_gid=763782570.1571681506&gtm=2wgaa0NLXNPCQ&cg1=article%7Cfeature&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=133&cd4=&cd6=Mon%20Oct%2021%202019%2020%3A11%3A45%20GMT%2B0200%20(Central%20European%20Summer%20Time)&cd7=1571681505598.4hz77trq&cd8=-2&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Peter%20Bright&cd26=679043&cd27=9055&cd28=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cd29=web&cd32=2015-08-26T01%3A00%3A56%2B00%3A00&cd34=2015-09-03T14%3A00%3A10%2B00%3A00&cd35=&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D679043&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cd93=information%20technology&cd97=-1303530583&cd98=article%7Cfeature&cd103=&cd113=data-layer-loaded&cd3=2007492185.1571681506&z=1121890916
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 11 Oct 2019 18:19:50 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
863516
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&gjid=443737167&_gid=763782570.1571681506&_u=aChAgUAjAAQC~&z=816236640
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&_v=j79&z=816236640
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&_v=j79&z=816236640&slf_rd=1&random=3690117983
42 B
434 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&_v=j79&z=816236640&slf_rd=1&random=3690117983
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=452238025&_v=j79&z=816236640&slf_rd=1&random=3690117983
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
local_storage_frame10.min.html
assets.bounceexchange.com/assets/bounce/ Frame 1EA6
0
0
Document
General
Full URL
https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Requested by
Host: assets.bounceexchange.com
URL: https://assets.bounceexchange.com/assets/smart-tag/versioned/ijs_all_modules_d69e5cee1bb28009159dc29dcdf2cad4.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.98.72.95 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
95.72.98.34.bc.googleusercontent.com
Software
UploadServer /
Resource Hash

Request headers

:method
GET
:authority
assets.bounceexchange.com
:scheme
https
:path
/assets/bounce/local_storage_frame10.min.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
x-guploader-uploadid
AEnB2UqKVPv_-XcfYjKBJ_mKlK_xFb6mauRJx4ZCqcrnS3fk_2GiHtpN65PIfPT7mCKLGPjRWzLsAgU4ZgUC0QCocHvWyrpYXA
date
Wed, 16 Oct 2019 04:33:10 GMT
expires
Thu, 15 Oct 2020 04:33:10 GMT
last-modified
Thu, 25 Jul 2019 15:10:57 GMT
etag
"55fccc7bc73db2181e976f1ccec90e2c"
x-goog-generation
1564067457180148
x-goog-metageneration
2
x-goog-stored-content-encoding
gzip
x-goog-stored-content-length
995
content-type
text/html
content-encoding
gzip
x-goog-hash
crc32c=z+risA== md5=VfzMe8c9shgel28czskOLA==
x-goog-storage-class
MULTI_REGIONAL
accept-ranges
bytes
vary
Accept-Encoding
content-length
995
access-control-allow-origin
*
server
UploadServer
cache-control
public, max-age=31536000
age
481116
alt-svc
clear
bid
c.amazon-adsystem.com/e/dtb/
47 B
393 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pid=3444848684851571681505313&cb=2544831662021571681506283&ws=1600x1200&v=7.38.00&t=1000&slots=%5B%7B%22sd%22%3A%22siderail_0%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%2C%7B%22sd%22%3A%22post_nav_0%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%2C%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldCFRoute%22%3Atrue%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.74.186 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-74-186.fra2.r.cloudfront.net
Software
Server /
Resource Hash
e450fb2896501f45461ff2aaf3a042b3df5f249b2b3afd759de0732ec95f7c39

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
via
1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA2-C2
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
47
x-amz-cf-id
Bi501EFSehH0ZJde4QSqLTDmjXEigevBzyzb0U04QGe4_0x-llg4Gw==
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1571681505347&de=195549176379&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=7392b0f-clean&zMoatDfpSlotId=native_xrail_0&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=2&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=1&zMoatNadoDataLoadTime=365&zMoatAllDataLoadTime=365&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&ac=1&bq=11&f=0&zn=0&if=365&na=56681406&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:46 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:46 GMT
page
t.skimresources.com/api/v2/
22 B
383 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._7QHMK1gI
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._7QHMK1gI;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks....
104 B
137 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._7QHMK1gI
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
61a9cccb8568b2da0166887f442732858229a4b471e487a3c5b7db5e18904f3d

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._7QHMK1gI
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A3ed4e846-f42e-11e9-a940-12724de64e5e;cfp=1;rndc=1571681506;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._1m9ITzPz
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._1m9ITzPz;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1571681506;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A3ed4e846-f42e-11e9-a940-12724de64e5e;cfp=1;rndc=1571681506;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=...
104 B
137 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A3ed4e846-f42e-11e9-a940-12724de64e5e;cfp=1;rndc=1571681506;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._1m9ITzPz
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
44cc484716f02852830d571b04dcc3504e088e1eb8f0eed246e924706b2d69a3

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:47 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:47 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A3ed4e846-f42e-11e9-a940-12724de64e5e;cfp=1;rndc=1571681506;cmd=bid;cors=yes;v=2;misc=1571681506356;callback=window.headertag.AolHtb.adResponseCallbacks._1m9ITzPz
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

cygnus
as-sec.casalemedia.com/
66 B
938 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A29413762%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2233%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2231%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22be3974ea-c911-4a6a-820b-0bb119325ff0%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-10-21T18%3A11%3A46%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
eb557d116038c95e9dcb4a51e91041f0789ffb6e3449b8e28c85e0de957c0790

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Mon, 21 Oct 2019 18:11:46 GMT
ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._bExmRuQm
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._bExmRuQm;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks....
103 B
160 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._bExmRuQm
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
e0f53b539638182ba270c81a18531d504acf0f2b94829b8c29266c5e29c7c060

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
103
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._bExmRuQm
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._WPvpQH7g
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._WPvpQH7g;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks....
104 B
137 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._WPvpQH7g
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
3305dfa037d68f51ed4a377638afe78bbef59da166e0cc53dd5ac73454a8c6db

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1571681505;cmd=bid;cors=yes;v=2;misc=1571681506359;callback=window.headertag.AolHtb.adResponseCallbacks._WPvpQH7g
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

cygnus
as-sec.casalemedia.com/
66 B
938 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A15991152%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%227%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%228%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22be3974ea-c911-4a6a-820b-0bb119325ff0%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-10-21T18%3A11%3A46%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
729b870b03b792d6cb0eb8e340ce1800bf547297a2efd816f8ed5ca7dd7454b8

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Mon, 21 Oct 2019 18:11:46 GMT
p
tr.snapchat.com/ Frame B4C6
0
0
Document
General
Full URL
https://tr.snapchat.com/p
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx/1.17.3 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
tr.snapchat.com
:scheme
https
:path
/p
content-length
372
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
server
nginx/1.17.3
date
Mon, 21 Oct 2019 18:11:46 GMT
content-type
text/html
content-length
0
access-control-allow-origin
*
cache-control
no-cache, no-transform
set-cookie
sc_at=v2|H4sIAAAAAAAAAAXBgRUAIAQFwIm85wtpnKKmMHx3iIOSSpLaSmr5KLCFIt9Yszj13G7YhAeMvfkDZolKVTIAAAA=;Version=1;Comment=;Domain=.snapchat.com;Path=/;Max-Age=33696000;Secure
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
Cookie set /
www.medtargetsystem.com/beacon/portal/ Frame 7096
0
0
Document
General
Full URL
https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&_sid=c5d81356-9d0d-493f-a3a8-b1d0fafcf875&_vid=5bcf2dbd-6434-4dce-92d6-cb63e518477c&_ak=119-556-B0E9F642&_flash=false&_th=1571681505|1571681505|1
Requested by
Host: www.medtargetsystem.com
URL: https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash

Request headers

Host
www.medtargetsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Mon, 21 Oct 2019 18:11:46 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Set-Cookie
DMDSESSID=3adm87b9las7v3hoivn7b6kqp3; path=/; HttpOnly
Vary
X-Forwarded-Proto,Accept-Encoding
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
6989
Connection
keep-alive
collect.gif
www.medtargetsystem.com/analytics/
0
313 B
Image
General
Full URL
https://www.medtargetsystem.com/analytics/collect.gif?e=1&aid=&vid=5bcf2dbd-6434-4dce-92d6-cb63e518477c&sid=c5d81356-9d0d-493f-a3a8-b1d0fafcf875&vh=1&vt=1571681505&pt=1571681505&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&r=&t=How%20security%20flaws%20work%3A%20The%20buffer%20overflow%20%7C%20Ars%20Technica&p=1690.86&pm=&ab=&ak=119-556-B0E9F642
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Server
Apache/2.4.7 (Ubuntu)
Connection
keep-alive
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
0
Vary
X-Forwarded-Proto
Content-Type
text/html; charset=UTF-8
877d5423-c46c-482f-a4f8-54240b7fae87
https://arstechnica.com/
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/877d5423-c46c-482f-a4f8-54240b7fae87
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame B6A2
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

status
200
date
Mon, 21 Oct 2019 18:11:46 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=d61d138b937abe0bd15e63afd488267091571681506; expires=Tue, 20-Oct-20 18:11:46 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1512124521 1512123934
via
1.1 varnish
cf-cache-status
HIT
age
368
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
529532283b2859d0-VIE
wt
polarcdn-pentos.com/ Frame 9D18
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=ae0ed39b-36eb-4ccc-a0f5-4ff263349ba2&v=2%2F52952b0&w=1.160.1&y=w&z=v1.6.48&pas=asa-web&pag2=%2F3379%2Fars.dart&pai=5e87f&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=3e5085f41290c0b03aa875997f92ac93&t=arx&parcid=b23c4&parid=b1d15&parin=1&partm=0&par=s&maxts=0.01&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&_=1571681506574
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
603129
cf-ray
5295322888ce2748-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
wt
polarcdn-pentos.com/ Frame 9D18
3 B
596 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=UNKNOWN&s=1&u=ae0ed39b-36eb-4ccc-a0f5-4ff263349ba2&v=2%2F52952b0&w=1.160.1&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&pai=5e87f&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=3e5085f41290c0b03aa875997f92ac93&t=atx&parcid=b23c4&parid=ce259&parin=2&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&_=1571681506575
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
603129
cf-ray
5295322888cf2748-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
req
bw-prod.plrsrvcs.com/ Frame 9D18
2 KB
1 KB
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/req
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dc0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1177c743e7512f7343fdb3af7d2235e3afddb3e89cbbd173637645013aa56869

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors
Content-Type
application/json

Response headers

date
Mon, 21 Oct 2019 18:11:48 GMT
via
1.1 google
x-polar-trace-id
cf-cache-status
DYNAMIC
x-polar-response-id
422e93f49df648f6b435c1d158529ab6
status
200
cf-ipcountry
DE
x-polar-h
7b1a4-12
x-polar-t
0.014
content-encoding
gzip
alt-svc
clear
pragma
no-cache
server
cloudflare
x-polar-misses
tq,at
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cache-control
no-cache, no-store, must-revalidate
cf-ray
529532290a848c86-VIE
expires
0
user
4d.condenastdigital.com/
67 B
404 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=7e18c8d9-eebd-446f-b231-d8842c2e5960
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.179.81 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-179-81.compute-1.amazonaws.com
Software
/
Resource Hash
ded952a47a611855d9ff94963cc1377f804853ed9331aeb0a65a375c6663d9f0

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
Content-Length
84
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5d826c83bcdfff482d6d06b0&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady26487458
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.177 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-177.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
9b1664c232b04784e459b6bcf3c576974066e0ca8420cc66b8c8be6484a52adc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2
X-Cache
Miss from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2081
X-XSS-Protection
1; mode=block
X-Request-Id
eb887981-a1cc-4070-9b57-db1b59b9a5cb
X-Runtime
0.009604
X-Backend-Node
10.110.45.152
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"aff1d22152e81f805a675e291f2d0cea"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
CmAXyCHtqzFbDMYXqL_hFz_IULF41ZMRxB6jmXWDRqvDzQjldTTlvg==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 3D82
271 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady26487458
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0765787f1966c35a86910225b871ca49249be9e882aade8899d624b431e7446b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
94100
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:46 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
72 KB
26 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady26487458
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0e87b8c960a0cae7b83821deb6e3449cd2f136f600a9fedcfb7a2b6b7af8b37c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:09:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 17 Oct 2019 15:18:55 GMT
server
sffe
age
128
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
26608
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:24:38 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame 3D82
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady26487458
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 05 Jun 2019 16:07:32 GMT
Content-Encoding
gzip
Age
11930655
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 7a5407bd3564d5f8494603c5f2d0661f.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
X-Amz-Cf-Id
5YDbv2z-ex5_EzB9qEROTtYZQiYESJoDNmHYkxleVj17Yzbr5TSzvQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-cab2b85e1b200eef70e6.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 3D82
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady26487458
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ccdae88a27f5cdd02c7c8e2525a1eeca05eb0a1cf0efd524379091a7ed2a6ede

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 15 Oct 2019 20:17:06 GMT
Content-Encoding
gzip
Age
510827
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234888
Last-Modified
Thu, 10 Oct 2019 18:39:09 GMT
Server
AmazonS3
ETag
"ba04c8e2bdec7ec3d534dc59cce1c2f4"
Content-Type
application/javascript
Via
1.1 f51b809c33f0bb5b1d5504f4df0c0a3f.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
X-Amz-Cf-Id
h4EE-hoXQt6vh5pzcRdlAJVD2k_12WvGhyZBcbO5Y1ayYIB5TVi8jg==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
get
odb.outbrain.com/utils/
15 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=103060&apv=false&sig=zVnKlTdn&format=vjapi&rand=16206&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&va=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1571681505450
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
4617e20d37a3950f6fb910a038f0427ce8735b373f4cdb4aeb1e98301f37c101
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-traceid
8a1f03466262bc1496240e11dbe591dd
content-length
8773
x-served-by
cache-jfk8136-JFK, cache-hhn4064-HHN
pragma
no-cache
x-timer
S1571681507.764232,VS0,VE272
date
Mon, 21 Oct 2019 18:11:47 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
104.156.90.36
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
truncated
/ Frame 9D18
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4bcac5d2e8cbee50095e0d525d8e4f961ae10985689132f49af10b1541fcc983

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
/
www.facebook.com/tr/ Frame 5CAA
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
2392
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
content-length
0
server
proxygen-bolt
alt-svc
h3-23=":443"; ma=3600
date
Mon, 21 Oct 2019 18:11:46 GMT
optanon.css
optanon.blob.core.windows.net/skins/5.2.0/default_flat_bottom_two_button_black/v2/css/
23 KB
6 KB
Stylesheet
General
Full URL
https://optanon.blob.core.windows.net/skins/5.2.0/default_flat_bottom_two_button_black/v2/css/optanon.css
Requested by
Host: optanon.blob.core.windows.net
URL: https://optanon.blob.core.windows.net/consent/c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
0bd0bc4edd5e4b256b9c40ce082680ad16a78ac5faf4d3337d39cf9605518bfe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Sep 2019 20:24:48 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
jzLE25vmrDR3ZmMxTSa8+w==
ETag
0x8D73D3F6B302F72
Content-Type
text/css
Access-Control-Allow-Origin
*
x-ms-request-id
97fe3dc8-e01e-0057-353b-88316b000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
x-ms-version
2009-09-19
Content-Length
5556
jquery-3.3.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.3.1.min.js
Requested by
Host: optanon.blob.core.windows.net
URL: https://optanon.blob.core.windows.net/consent/c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:3a , Netherlands, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Last-Modified
Sat, 20 Jan 2018 17:26:44 GMT
Server
nginx
ETag
W/"5a637bd4-1538f"
Vary
Accept-Encoding
X-HW
1571681506.dop002.fr8.t,1571681506.cds148.fr8.shn,1571681506.cds148.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30288
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

Sec-Fetch-Mode
cors
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Content-Encoding
gzip
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
X-Amz-Cf-Pop
FRA2
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
29632
Access-Control-Allow-Origin
*
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Via
1.1 9bb7bac3df4ba5eb70e607f6fa98eab8.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
e44R0yW4b1DwoVRsYLNGrTgik8ZUyLa-dl9o-FVmpJQ6pvSowCikzQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.343.1_en.html
imasdk.googleapis.com/js/core/ Frame 6E0E
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.343.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.343.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
193394
date
Sat, 19 Oct 2019 00:18:35 GMT
expires
Sun, 18 Oct 2020 00:18:35 GMT
last-modified
Thu, 17 Oct 2019 15:13:57 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
237191
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:46 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA2
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 f51b809c33f0bb5b1d5504f4df0c0a3f.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
KMQ1TfFVDa6P4ZU8ED_h-be5jvJm6blReyOoyItjHGbMiGCyPvUPHA==
1663130473914833
connect.facebook.net/signals/config/
280 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.5&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
7709303f4e6b2e591cc3dacf550c8d0db8367b5d55e677077201d6a50c609b80
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
66234
x-xss-protection
0
pragma
public
x-fb-debug
eRFA5L+uQpwjx+ML5v8eRzoeR46uKjUiIZ6E2ZMNKZN25bes5kPOjieLofZ3uOnUDkpDVSYYRbue7AQ8izWrEg==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Mon, 21 Oct 2019 18:11:46 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
collect
www.google-analytics.com/r/
35 B
169 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:46 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A46.802Z&_c=&_t=Player%20Requested&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:47 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_how-the-stack-works-part-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1439751452/
31 KB
32 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1439751452/arstechnica_how-the-stack-works-part-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
d9742ea40c3b20a1db1cb838d11472c35ab5d8abe7cf2dc18797c43fbb392b99

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 28 Sep 2019 15:50:32 GMT
Via
1.1 varnish, 1.1 ea71ce4ac4724c3ed76f4816ddddaa6c.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2
Edge-Cache-Tag
bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
31836
X-Served-By
cache-hhn4033-HHN
Last-Modified
Sun, 16 Aug 2015 19:16:17 GMT
Server
cloudinary
X-Timer
S1569685832.316851,VS0,VE1
ETag
"585ce9c6192e33f6db9f7efa44dbdfb7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
8nnGcWgPGt35wL7SXw8RjjW_y_kjZuYKt8wMnNOQ9l5k08s4sUlt1g==
X-Cache-Hits
1
pixel.gif
v4.moatads.com/
0
0

track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A47.079Z&_t=slot_loaded&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=250888aa-8bcc-4073-bdf3-f2c607f65752&uNw=1&uUq=1&pID=08aebb37-8c83-4610-9bfd-452f023b84d1&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fars.dart%2Finformation-technology%22%2C%22advertiserId%22%3A1454517775%2C%22campaignId%22%3A2338761482%2C%22creativeId%22%3A138237302059%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A4736014287%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x140%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681506098%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1571681507079%7D&dim4=%7B%22pos%22%3A%5B%22sponsor%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22_Fu1sMXSWr5d_%22%5D%7D&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:47 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A47.092Z&_t=pageview&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=250888aa-8bcc-4073-bdf3-f2c607f65752&sID=d8d97995-ec8e-40ad-96be-c1abb2263280&pID=08aebb37-8c83-4610-9bfd-452f023b84d1&uDt=desktop&_o=ars-technica&_c=general&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:47 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
57
p.ad.gt/api/v1/p/
23 KB
8 KB
Script
General
Full URL
https://p.ad.gt/api/v1/p/57
Requested by
Host: a.ad.gt
URL: https://a.ad.gt/api/v1/u/matches/57
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.10.35.234 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-10-35-234.us-west-2.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
a4bdf4081ca145a3c47424f72b0a1378e0d06477afd4c34af2942706c1abcd29

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
gzip
last-modified
Thu, 17 Oct 2019 17:31:18 GMT
server
nginx/1.14.1
etag
W/"1571333478.0-23870-2545748540"
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
cache-control
public, max-age=43200
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
expires
Tue, 22 Oct 2019 06:11:47 GMT
match
ids.ad.gt/api/v1/
Redirect Chain
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&adnxs_id=$UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3De37c7d18-d322-45ad-bc07-8149ef1d4444%26adnxs_id%3D%24UID
  • https://ids.ad.gt/api/v1/match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&adnxs_id=8946887055383900570
43 B
597 B
Image
General
Full URL
https://ids.ad.gt/api/v1/match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&adnxs_id=8946887055383900570
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.253.167 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-253-167.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 22 Oct 2019 06:11:48 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif

Redirect headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:49 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 536.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.197:80
AN-X-Request-Uuid
09b6dea4-b760-4b0a-92e0-02516810135d
Server
nginx/1.13.4
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://ids.ad.gt/api/v1/match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&adnxs_id=8946887055383900570
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
t_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=e37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=e37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://ids.ad.gt/api/v1/t_match?tdid=9fd691f7-3aa7-4aa0-8e91-dd0e9982e769&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
43 B
588 B
Image
General
Full URL
https://ids.ad.gt/api/v1/t_match?tdid=9fd691f7-3aa7-4aa0-8e91-dd0e9982e769&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.253.167 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-253-167.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 22 Oct 2019 06:11:48 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:47 GMT
x-aspnet-version
4.0.30319
status
302
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
location
https://ids.ad.gt/api/v1/t_match?tdid=9fd691f7-3aa7-4aa0-8e91-dd0e9982e769&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
259
pbm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://ids.ad.gt/api/v1/pbm_match?pbm=B25E06C1-C956-4EDD-BF8C-A59A453AAA6C&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
43 B
588 B
Image
General
Full URL
https://ids.ad.gt/api/v1/pbm_match?pbm=B25E06C1-C956-4EDD-BF8C-A59A453AAA6C&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.253.167 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-253-167.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 22 Oct 2019 06:11:48 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Location
https://ids.ad.gt/api/v1/pbm_match?pbm=B25E06C1-C956-4EDD-BF8C-A59A453AAA6C&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Date
Mon, 21 Oct 2019 18:11:47 GMT
X-Cnection
close
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6
Content-Length
439
Content-Type
text/html; charset=iso-8859-1
g_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm=&google_sc=&google_ula=450542624&id=e37c7d18-d322-45ad-bc07-8149ef1d4444&google_tc=
  • https://ids.ad.gt/api/v1/g_match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&google_gid=CAESEPqaLkJO_ZMQ0qhWz7bZpLw&google_cver=1&google_ula=450542624,0
43 B
605 B
Image
General
Full URL
https://ids.ad.gt/api/v1/g_match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&google_gid=CAESEPqaLkJO_ZMQ0qhWz7bZpLw&google_cver=1&google_ula=450542624,0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.253.167 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-253-167.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 22 Oct 2019 06:11:48 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:47 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://ids.ad.gt/api/v1/g_match?id=e37c7d18-d322-45ad-bc07-8149ef1d4444&google_gid=CAESEPqaLkJO_ZMQ0qhWz7bZpLw&google_cver=1&google_ula=450542624,0
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
357
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
umcheck
cs.emxdgt.com/
Redirect Chain
  • https://cs.emxdgt.com/um?redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24UID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://ib.adnxs.com/getuid?https://cs.emxdgt.com/umcheck?apnxid=$UID&redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24EMXUID%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://cs.emxdgt.com/umcheck?apnxid=8946887055383900570&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
43 B
97 B
Image
General
Full URL
https://cs.emxdgt.com/umcheck?apnxid=8946887055383900570&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.195.155.181 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-195-155-181.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 21 Oct 2019 18:11:46 GMT
content-length
43
x-nosync
na;
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:49 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 373.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.74:80
AN-X-Request-Uuid
4b6b891d-bb0a-4ad3-98b0-20170e7ccc7d
Server
nginx/1.13.4
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://cs.emxdgt.com/umcheck?apnxid=8946887055383900570&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
amo_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://sd.turn.com/r/dd/id/L2NzaWQvMS9jaWQvMTc0ODI0MTY1OC90LzA/url/https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Famo_match%3Fturn_id%3D%24!%7BTURN_UUID%7D%26id%3De37c7d18-d322-45ad-bc07-8149ef1d4444
  • https://ids.ad.gt/api/v1/amo_match?turn_id=8715615613836743585&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
43 B
575 B
Image
General
Full URL
https://ids.ad.gt/api/v1/amo_match?turn_id=8715615613836743585&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.253.167 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-253-167.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 22 Oct 2019 06:11:48 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Location
https://ids.ad.gt/api/v1/amo_match?turn_id=8715615613836743585&id=e37c7d18-d322-45ad-bc07-8149ef1d4444
Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:47 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
Content-Length
0
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
store
match.deepintent.com/usersync/114/
0
218 B
Image
General
Full URL
https://match.deepintent.com/usersync/114/store?id=UNK&ext1=c5d81356-9d0d-493f-a3a8-b1d0fafcf875
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.202.179 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-6-202-179.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 21 Oct 2019 18:11:47 GMT
server
nginx
content-type
image/gif
content-length
0
p3p
policyref='http://cdn.deepintent.com/p3p.xml', CP='NON CUR DEV TAI'
8401ff2a-2a07-4b35-96ef-42a102633be9thumbs.mp4
dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/
83 KB
83 KB
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/8401ff2a-2a07-4b35-96ef-42a102633be9thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c5f5f6694df995ebaa8c1ecb31388f2852474ee02f81d08da30fbed9aff7e1f6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Via
1.1 d8328954e51c0912a8419c1a67cea1dc.cloudfront.net (CloudFront)
Last-Modified
Sun, 16 Aug 2015 18:34:31 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA2-C1
ETag
"41b887fc7784dfa97bb590fe2d92ce81"
X-Cache
Miss from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-84834/84835
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
84835
X-Amz-Cf-Id
e1kLPArDcixoIoBZK8qbVywIZYZNBpQ-BL_ep1jphrVizCACL2pdAQ==
8401ff2a-2a07-4b35-96ef-42a102633be9thumbs.mp4
dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/
43 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/8401ff2a-2a07-4b35-96ef-42a102633be9thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Via
1.1 f7bf326347bdd7f275a38a22b5b83724.cloudfront.net (CloudFront)
Last-Modified
Sun, 16 Aug 2015 18:34:31 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA2-C1
ETag
"41b887fc7784dfa97bb590fe2d92ce81"
X-Cache
Miss from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-84834/84835
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
84835
X-Amz-Cf-Id
L4aN5qYNda51AnTw43FPUwLEBdiWSy5Tsr9GpjdmBh7SB9WxeKld3g==
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A47.113Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fhow-the-stack-works-part-1%2F&cId=55d0d42c61646d257d000000&cKe=&cPd=2015-08-16T18%3A19%3A24%2B00%3A00&cTi=1.%20How%20Buffer%20Overflows%20work%3A%20the%20stack&mDu=477&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=800&pWh=450&xid=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22836a6f8%22%2C%22guid%22%3A%2262a4c963-899a-f6b5-c18f-8063c0315a6d%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A4369.515625%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Cfeature%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Cfeature
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:47 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
64fdfbde-56cd-4e2d-855e-6e441ec5e85c
https://arstechnica.com/
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/64fdfbde-56cd-4e2d-855e-6e441ec5e85c
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
8401ff2a-2a07-4b35-96ef-42a102633be9manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/
802 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/8401ff2a-2a07-4b35-96ef-42a102633be9manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
7b9dadb6a3a9b8c3190390aa6e416db7747eca20803af8777c1d142bc61a6e03

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
Vary
Origin
X-Amz-Cf-Pop
FRA2-C1
X-Cache
Miss from cloudfront
Connection
keep-alive
Content-Length
802
Last-Modified
Sat, 21 Jan 2017 02:10:19 GMT
Server
AmazonS3
ETag
"2e0b97bbddfecf70ecd98c3d817220f6"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Accept-Ranges
bytes
X-Amz-Cf-Id
cqG2gOyEHI-Oj7RLMFiK8lGC0ANMMTWp9QI54DLZ8XzLoWgvRtVQYw==
rum.js
securepubads.g.doubleclick.net/pagead/js/ Frame 9D18
49 KB
19 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/pagead/js/rum.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
24270887b28394cc0716af7ea1928f143c323120b1716ce547e31a77faa832c4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 17:43:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1696
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
19111
x-xss-protection
0
server
cafe
etag
5740004246786903836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Mon, 21 Oct 2019 18:43:31 GMT
06282bcd-5c27-4294-8769-4d57ec21a908
https://arstechnica.com/ Frame 3D82
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/06282bcd-5c27-4294-8769-4d57ec21a908
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
hotfix-experiment-unload-heartbeats-only-engagedtime_slots-3.js
d1z2jf7jlzjs58.cloudfront.net/code/
137 KB
42 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/hotfix-experiment-unload-heartbeats-only-engagedtime_slots-3.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.215 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-215.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
8899c2ad3ce92213431765a7253a292e9b0fab988d5b68bf8961a83137c6ae6b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:47:55 GMT
Content-Encoding
gzip
Age
433415
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Wed, 16 Oct 2019 17:38:56 GMT
Server
nginx
ETag
W/"5da755b0-2230a"
Content-Type
application/x-javascript
Via
1.1 1d87c34bb2f20fda8e0841bc33179769.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
ucX69S5WdSAoU5dkjIQVtGWop2sdD8_bcDu9BsFdJuePmk9yuHLIIA==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
EU
geolocation.onetrust.com/cookieconsentpub/v1/geo/countries/
32 B
324 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/countries/EU?callback=jQuery33106384977361631428_1571681507193&_=1571681507194
Requested by
Host: code.jquery.com
URL: https://code.jquery.com/jquery-3.3.1.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b0817a0d6a87f2d42532035e42b20ea55cfaa5ca1092c761f5fc5e734790bdbf

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:47 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
status
200
cf-ray
5295322eb8498c6e-VIE
content-length
32
arstechnica_how-the-stack-works-part-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1439751452/
31 KB
32 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1439751452/arstechnica_how-the-stack-works-part-1.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
d9742ea40c3b20a1db1cb838d11472c35ab5d8abe7cf2dc18797c43fbb392b99

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 28 Sep 2019 15:50:32 GMT
Via
1.1 varnish, 1.1 281d5965f165d7acaf2c52921da12d67.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2
Edge-Cache-Tag
bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
31836
X-Served-By
cache-hhn4033-HHN
Last-Modified
Sun, 16 Aug 2015 19:16:17 GMT
Server
cloudinary
X-Timer
S1569685832.316851,VS0,VE1
ETag
"585ce9c6192e33f6db9f7efa44dbdfb7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
CG1kHf_CADkMkomlXZWtOpIFiERiLgdRCGg2F6pzXa6GHpmpEipDbg==
X-Cache-Hits
1
arstechnica_how-the-stack-works-part-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1439751452/
31 KB
32 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1439751452/arstechnica_how-the-stack-works-part-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
d9742ea40c3b20a1db1cb838d11472c35ab5d8abe7cf2dc18797c43fbb392b99

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 28 Sep 2019 15:50:32 GMT
Via
1.1 varnish, 1.1 ea71ce4ac4724c3ed76f4816ddddaa6c.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2
Edge-Cache-Tag
bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
31836
X-Served-By
cache-hhn4033-HHN
Last-Modified
Sun, 16 Aug 2015 19:16:17 GMT
Server
cloudinary
X-Timer
S1569685832.316851,VS0,VE1
ETag
"585ce9c6192e33f6db9f7efa44dbdfb7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
cuFeXvPbCl0dqcVViXvK-db_g2bQpOZrsy0LJ63IcZKCSMZG0aSmnA==
X-Cache-Hits
1
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame 3D82
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

Sec-Fetch-Mode
cors
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Content-Encoding
gzip
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
X-Amz-Cf-Pop
FRA2
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
29632
Access-Control-Allow-Origin
*
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Via
1.1 9bb7bac3df4ba5eb70e607f6fa98eab8.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
MIPtzCCGogoS5Stf7yl6sWOQmDBY1v4RygbK4wUGuf_zJYTV7MJjPQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.343.1_en.html
imasdk.googleapis.com/js/core/ Frame 3667
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.343.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.343.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
193394
date
Sat, 19 Oct 2019 00:18:35 GMT
expires
Sun, 18 Oct 2020 00:18:35 GMT
last-modified
Thu, 17 Oct 2019 15:13:57 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
237192
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 3D82
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:47 GMT
integrator.js
adservice.google.com/adsid/ Frame 3D82
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame 3D82
103 KB
22 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
9404cee30e4489a7ed4d6de2dd92aa8e4386fd5ff1c81ebcea77f581952eac31
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
22458
x-xss-protection
0
pragma
public
x-fb-debug
oTVUBY0EzyOtwlgePSLsKycCk790BQI9PYE/696784OMA/TLM4/Pq+k+/+BL+o0yzGkAjtdUUMwo29qTPXuIZw==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Mon, 21 Oct 2019 18:11:47 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 3D82
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:46 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
280
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 f51b809c33f0bb5b1d5504f4df0c0a3f.cloudfront.net (CloudFront)
Connection
keep-alive
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2
X-Amz-Cf-Id
suYsNnlHugVlU3FOmjGeaYa24nx7_qsv6r_fwpg8HBPwanMIiI8k-A==
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:48 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
infinityid
infinityid.condenastdigital.com/ Frame 3D82
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.29.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-29-231.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
6ab89bec5e1c974156258ab32dbe22e7d5dd61b65fe20d2fbae868787d79037c

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
Content-Length
55
track
capture.condenastdigital.com/ Frame 3D82
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A47.215Z&_c=&_t=Player%20Requested&sID=d8d97995-ec8e-40ad-96be-c1abb2263280&pID=08aebb37-8c83-4610-9bfd-452f023b84d1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:47 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/ Frame 3D82
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
f513c914f8f3cf4975bf34937100375c4b4164ec77ec011488b643452f6ae22f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 15:13:51 GMT
Via
1.1 varnish, 1.1 ea71ce4ac4724c3ed76f4816ddddaa6c.cloudfront.net (CloudFront)
Age
2429876
Edge-Cache-Tag
390602458176548494884398897259766670181,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66728
X-Request-Id
44faf04ca234bc99
X-Served-By
cache-fra19143-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 15:00:59 GMT
Server
cloudinary
X-Timer
S1569251631.287169,VS0,VE180
ETag
"c43a026bdd689dfa9ab341b71ae2cd02"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
JUCUXps29GmgcqOpsoAkyIs8DsybISVr1sr61x2lfIYk32OtAdZT5Q==
X-Cache-Hits
0
ads
securepubads.g.doubleclick.net/gampad/
5 KB
3 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2983342256337245&correlator=2237722942949477&output=ldjh&impl=fifs&adsid=NT&eid=21062453%2C21064372%2C21064550%2C21064502&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191021&iu_parts=3379%2Cconde.ars%2Crail%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dhow-security-flaws-work-the-buffer-overflow%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_entities%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_keywords%3Daddress%252Cbuffer_overflow%252Csystem%252Cmorris_worm%252Cmemory%252Cfunction%252Cprocessor%252Cpage_layout%252Cprogram%252Clinux%252Cinstruction%252Cprocess%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Cobject%252Cesp%252Cproblem%252Ccomputer_security%252Cinternet_worm%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C120000%252C121100%252C131100%252C131103%252C131135%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252C2hkgm5%252Cap05we%252Cv8lc56%252C65f9pd%252Cawpwvf%252Cfu1smxswr5d%26ctx_advertisers%3D1454517775%26ctx_line_items%3D4736014287%26ctx_creatives%3D138237302059%26vnd_4d_sid%3Df5f561c8-ba52-41f2-8b19-aa13f627c05f%26vnd_4d_pid%3D2475f86c-fd58-47de-883c-b22dc3b4abb5%26vnd_4d_xid%3D7e18c8d9-eebd-446f-b231-d8842c2e5960&cookie_enabled=1&bc=31&abxe=1&lmt=1571681507&dt=1571681507392&dlt=1571681505246&idt=319&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=370&adks=1483574547&ucis=5&ifi=5&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dssz=82&icsg=2467304092729344&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=2007492185.1571681506&ga_sid=1571681506&ga_hid=2031134372&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
eecd392e02b113b0854fbc55131ee6a191280f3ad6bce7a0ca8abb7fccde3fb0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2689
x-xss-protection
0
google-lineitem-id
5046266783
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138269308047
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
12 KB
6 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2983342256337245&correlator=2237722942949477&output=ldjh&impl=fifs&adsid=NT&eid=21062453%2C21064372%2C21064550%2C21064502&vrg=2019101401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20191021&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C9x1%7C10x1&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dhow-security-flaws-work-the-buffer-overflow%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_entities%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_keywords%3Daddress%252Cbuffer_overflow%252Csystem%252Cmorris_worm%252Cmemory%252Cfunction%252Cprocessor%252Cpage_layout%252Cprogram%252Clinux%252Cinstruction%252Cprocess%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Cobject%252Cesp%252Cproblem%252Ccomputer_security%252Cinternet_worm%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C120000%252C121100%252C131100%252C131103%252C131135%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252C2hkgm5%252Cap05we%252Cv8lc56%252C65f9pd%252Cawpwvf%252Cfu1smxswr5d%26ctx_advertisers%3D1454517775%26ctx_line_items%3D4736014287%26ctx_creatives%3D138237302059%26vnd_4d_sid%3Df5f561c8-ba52-41f2-8b19-aa13f627c05f%26vnd_4d_pid%3D2475f86c-fd58-47de-883c-b22dc3b4abb5%26vnd_4d_xid%3D7e18c8d9-eebd-446f-b231-d8842c2e5960&cookie_enabled=1&bc=31&abxe=1&lmt=1571681507&dt=1571681507402&dlt=1571681505246&idt=319&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=80&adks=2385402828&ucis=7&ifi=7&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dssz=82&icsg=2467304092729344&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90&msz=1585x90&ga_vid=2007492185.1571681506&ga_sid=1571681506&ga_hid=2031134372&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
721e4d5d78c9b23b173494af66b09bebd4a7c2ad6a74364ef68a7066bcc5e2a5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5567
x-xss-protection
0
google-lineitem-id
5199899035
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138291345044
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
Cookie set obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 58C1
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1571681505450
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

Server
Apache
ETag
"e5ddb6c48ca36506c89f06a58a6bb66f:1571332254"
Last-Modified
Thu, 17 Oct 2019 17:00:44 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Mon, 21 Oct 2019 18:11:47 GMT
Content-Length
3738
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
Set-Cookie
akacd_widgets_routing=3749134306~rv=18~id=6ed35bc97ee8815cda24ffc9afacbe8c; path=/;
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=445079655fa558cb69f28153a811d32d_6817_1571681506979&tm=1652&eT=0&wRV=103060&pVis=0&lsd=665664a8-01e6-4883-9954-09cc4162f5c4&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1571681505450
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
abc7ecb86c51d897a2950a08969c9c3d
Content-Length
30
eyJpdSI6IjhkYjJiYzExZDQ2NjUwZDdiMDUyN2YyNzg0MTgxN2JjN2Q0ODE5MjJjNGIxMTljZWVjYTdiN2FkZDU2OTUyMzkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
9 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjhkYjJiYzExZDQ2NjUwZDdiMDUyN2YyNzg0MTgxN2JjN2Q0ODE5MjJjNGIxMTljZWVjYTdiN2FkZDU2OTUyMzkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0adab74f1aeeead55075872b9c4b96f331601e619a739b294eb41dc369fb81b7
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 01 Oct 2019 07:53:49 GMT
Date
Mon, 21 Oct 2019 18:11:47 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
2bbc194647d34683ad4e58699c1f983e
Timing-Allow-Origin
*
Content-Length
8922
eyJpdSI6IjUxYzE0OWI4OWYyOWMyZTNhNDU2ODMxMDVkODFhNDg5YTRhMDQyOWIzYjU5YjY3NGE3YmE0NDBhMzY4NmI1NmQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
11 KB
12 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjUxYzE0OWI4OWYyOWMyZTNhNDU2ODMxMDVkODFhNDg5YTRhMDQyOWIzYjU5YjY3NGE3YmE0NDBhMzY4NmI1NmQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9537f66a236619970123da504e1f6ed402f72880606351625ceb89712a48d3a4
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 25 Sep 2019 09:42:03 GMT
Date
Mon, 21 Oct 2019 18:11:47 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1785235
Connection
keep-alive
X-TraceId
9e6a0688c417f5548e4b93bb628c491f
Timing-Allow-Origin
*
Content-Length
11474
eyJpdSI6IjdkZTgzZjE3ZjIxMjgxZWVjMzZjNWEwNTk4OWYxZWNlMTRkOWM0MWZjNzVmMDgxODdiODk2ODZmNzQ2ODg0ZWYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
11 KB
11 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjdkZTgzZjE3ZjIxMjgxZWVjMzZjNWEwNTk4OWYxZWNlMTRkOWM0MWZjNzVmMDgxODdiODk2ODZmNzQ2ODg0ZWYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b8062b50ce311ff9e5bd62ebc789741d28c6690bbe05550a7a6f286e92760201
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 28 Sep 2019 18:55:38 GMT
Date
Mon, 21 Oct 2019 18:11:47 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
9eadc1febc8946c2bc4cd6dd2047c7ef
Timing-Allow-Origin
*
Content-Length
11372
eyJpdSI6IjJkOWEzMTgzZDQwNTE1ZGRlMjZlNzQ0NjVjZmNhZTUxMTg5MzZkNjMyMzYzMDJmNjExMDEwN2NjNjQ3YzdkZmUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
13 KB
13 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjJkOWEzMTgzZDQwNTE1ZGRlMjZlNzQ0NjVjZmNhZTUxMTg5MzZkNjMyMzYzMDJmNjExMDEwN2NjNjQ3YzdkZmUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1ddadb0b7bd584bd85da731b073c56a1572399cf704081a12e95c701a0bbebf4
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 27 Sep 2019 12:50:33 GMT
Date
Mon, 21 Oct 2019 18:11:48 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462399
Connection
keep-alive
X-TraceId
c6a3ea7b2850171487861c1b4f0408d2
Timing-Allow-Origin
*
Content-Length
12982
eyJpdSI6ImEzOWRlMzljMmE4NTNjZjA3ZWE5MjRkY2E1YmRhMzUwMWExMzFmNjIwNGRiYmJkYzk5MTc0ZTczNzAwYzVmNWQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
5 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImEzOWRlMzljMmE4NTNjZjA3ZWE5MjRkY2E1YmRhMzUwMWExMzFmNjIwNGRiYmJkYzk5MTc0ZTczNzAwYzVmNWQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dfaa95b975451ae0aeb18ad6aa73d954112c778b3bf76e219f2570f583c9e388
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 04 Oct 2019 11:42:02 GMT
Date
Mon, 21 Oct 2019 18:11:48 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
f172baa9a5121e6a9c32765f9c082242
Timing-Allow-Origin
*
Content-Length
5320
eyJpdSI6ImJiZmUyZTA1YzliYTMwNTQ5MGQ3ZjViZmEzNTA2ZmU5ZDEyZWYwNzRlZDEzMThiZjU4YTdhMDE5MThlNWEyZmUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
12 KB
12 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImJiZmUyZTA1YzliYTMwNTQ5MGQ3ZjViZmEzNTA2ZmU5ZDEyZWYwNzRlZDEzMThiZjU4YTdhMDE5MThlNWEyZmUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c1d3102c48c0a3b056ce43eb39b1c4043cffdd69ac8915efdf77d816c9227109
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 27 Sep 2019 23:30:24 GMT
Date
Mon, 21 Oct 2019 18:11:47 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2398319
Connection
keep-alive
X-TraceId
ed1f811fab9fa82d6aaa712355dd65b0
Timing-Allow-Origin
*
Content-Length
12250
34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 3D82
128 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Mon, 21 Oct 2019 11:16:52 GMT
Via
1.1 d8328954e51c0912a8419c1a67cea1dc.cloudfront.net (CloudFront)
Last-Modified
Wed, 18 Sep 2019 17:46:59 GMT
Server
AmazonS3
Age
24895
ETag
"95fd1c34edea880d5b998b6cc199590d"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1810475/1810476
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Content-Length
1810476
X-Amz-Cf-Id
k9feHlBPVGEuih2QFi08qAOuJCr--Q7mjfBCl_qdhONxykH8XdZ7hw==
34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 3D82
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Mon, 21 Oct 2019 11:16:52 GMT
Via
1.1 f7bf326347bdd7f275a38a22b5b83724.cloudfront.net (CloudFront)
Last-Modified
Wed, 18 Sep 2019 17:46:59 GMT
Server
AmazonS3
Age
24896
ETag
"95fd1c34edea880d5b998b6cc199590d"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1810475/1810476
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Content-Length
1810476
X-Amz-Cf-Id
R74odIVoFvM4-TKq4SIkRhuF6ET4qCPFwPbkRig740Y5wpVR6dG2VA==
track
capture.condenastdigital.com/ Frame 3D82
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A47.553Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-civilization%2F&cId=5d826c83bcdfff482d6d06b0&cKe=&cPd=2019-09-23T15%3A00%3A00%2B00%3A00&cTi=Civilization%3A%20It%27s%20good%20to%20take%20turns%20%7C%20War%20Stories&mDu=734&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pID=08aebb37-8c83-4610-9bfd-452f023b84d1&pWw=540&pWh=303.75&sID=d8d97995-ec8e-40ad-96be-c1abb2263280&uId=250888aa-8bcc-4073-bdf3-f2c607f65752&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22836a6f8%22%2C%22guid%22%3A%2272f6caa5-ad02-2f92-2d64-ef22ac24f%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A8491.859375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Cfeature%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Cfeature
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:48 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
2ed48402-3021-45a7-a710-a420d8e95d85
https://arstechnica.com/ Frame 3D82
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/2ed48402-3021-45a7-a710-a420d8e95d85
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
34483233-a98f-4020-929a-0a3b80c0b769manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 3D82
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174dec2e7da4b324c72c1d5fd1591832b170024d71fec278f94554452cea9f53

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 17:26:00 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
Vary
Origin
Age
2748
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Wed, 18 Sep 2019 17:45:26 GMT
Server
AmazonS3
ETag
"43f83b685faa046cc9c39efc39fc5eb7"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
eJy0LSvXdrq_mFblzufpCrITZy9JS33ttmEwJwaS2dlC_Zd33PLrcA==
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:47 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Mon, 21 Oct 2019 18:11:47 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:47 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Mon, 21 Oct 2019 18:11:47 GMT
8401ff2a-2a07-4b35-96ef-42a102633be9file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/
4 KB
923 B
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/8401ff2a-2a07-4b35-96ef-42a102633be9file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
7ed658ce108ba9684ea3ba1d6c77f92ce23c36f3b46636a532e8cec2e647bbb1

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Content-Encoding
gzip
Last-Modified
Sat, 21 Jan 2017 02:10:18 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA2-C1
Vary
Accept-Encoding,Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Miss from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
3Nrmj6TsT0QUM9gMtKZ2Bw4XV1wUBEjBJoQetFyuh77PpssFN_SZow==
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 3D82
10 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3495e9f8299dc6ef6234bf69cea0e36741cf4613cd8e1d30763105546305999d

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 20 Oct 2019 18:30:34 GMT
Content-Encoding
gzip
Vary
Origin
Age
85274
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 18 Sep 2019 17:49:17 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 7a3193ebce69450274ae629ce856b09d.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
Wg3A2ZpZPbcJKejTKNs5HYj5aTRQmNM3S3N_V2zGlRWokRnmRhvGwQ==
csi
csi.gstatic.com/ Frame 9D18
0
260 B
Other
General
Full URL
https://csi.gstatic.com/csi?v=2&s=pagead&action=csi_pagead&dmc=8&puid=1~k20ql8nv&chm=1&ctx=2&qqid=COed8O75reUCFQaR3godIWoAFQ&met.4=fb.3~lb.hs~ol.rg~idt.34~dt.-5r&met.3=197.hr~123.ho_3~118.hw_1~117.rf~197.tk~118.tl~118.tl~118.ts~118.ts~118.tt~118.11i~118.152~118.162~113.169_2~112.168_3&met.1=1.k20ql7hn~14.0~15.0~16.0~17.0~18.0~19.0~20.rf~21.rf&met.7=CCIQBBgBIAMoAzAXOBRoBHAXeEuwAQG4AQM~CBsQCiAEOKEB~CCoQChgBIAQoBDA_ODs~CBsQCiAEOBE~CBsQDSD9Azg_~CBsQDSCABDg6~CCgQChgBILEIKLEIMNELOKEDaMsLcNALeNqWAYABp5UBiAH5hwOwAQG4AQM
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/js/rum.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4012:1::2003 , Australia, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:48 GMT
last-modified
Wed, 21 Jan 2004 19:51:30 GMT
server
Golfe2
status
204
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
getpixels
pixels.ad.gt/api/v1/
0
343 B
Script
General
Full URL
https://pixels.ad.gt/api/v1/getpixels?tagger_id=a56186a3a90da2fc5034afab463f7701&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&code=%27none%27
Requested by
Host: p.ad.gt
URL: https://p.ad.gt/api/v1/p/57
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.69.119.154 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-69-119-154.us-west-2.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
date
Mon, 21 Oct 2019 18:11:48 GMT
server
nginx/1.14.1
access-control-allow-origin
*
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
access-control-allow-methods
GET, POST, OPTIONS
access-control-expose-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
ecommerce.js
www.google-analytics.com/plugins/ua/
1 KB
826 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ecommerce.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8e1b84265e633c043720dd0921476c16bc9f75e393e855c9116ca7c3a847b5c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:01:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
608
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
735
x-xss-protection
0
expires
Mon, 21 Oct 2019 19:01:40 GMT
ec.js
www.google-analytics.com/plugins/ua/
3 KB
1 KB
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ec.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 17:19:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
3144
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1296
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:19:24 GMT
conde_nast_xid
ids.ad.gt/api/v1/put/
43 B
629 B
Image
General
Full URL
https://ids.ad.gt/api/v1/put/conde_nast_xid?conde_nast_xid=7e18c8d9-eebd-446f-b231-d8842c2e5960
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.253.167 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-253-167.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:48 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 22 Oct 2019 06:11:48 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
/
srv-2019-10-21-18.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-10-21-18.pixel.parsely.com/plogger/?rand=1571681507663&plid=69732286&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%22e43c83af-a4bc-48a6-9f2e-4ae201958d3b%22%2C%22parsely_site_uuid%22%3A%22dffc2b8a-d8ad-4122-99e9-6645c032f06a%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&sref=&sts=1571681507659&slts=0&title=How+security+flaws+work%3A+The+buffer+overflow+%7C+Ars+Technica&date=Mon+Oct+21+2019+20%3A11%3A47+GMT%2B0200+(Central+European+Summer+Time)&action=pageview&pvid=62389175&u=dffc2b8a-d8ad-4122-99e9-6645c032f06a
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.197.187 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-197-187.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:37 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
d9aa5690-0772-47b6-972f-334d50b03b48
https://arstechnica.com/ Frame 3D82
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/d9aa5690-0772-47b6-972f-334d50b03b48
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 3D82
596 KB
576 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c4b1dd4bb7210351cac5fd51aaf55a2220532739c042c15ae3667aa3d1198079

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 20 Oct 2019 18:27:30 GMT
Content-Encoding
gzip
Vary
Origin
Age
85458
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 18 Sep 2019 17:49:12 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 7a3193ebce69450274ae629ce856b09d.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
0Vhxp0C7v0sQE_JVCxUW-v7HDXR5IRo5CvTlaiaha06nDMvazxJ6_w==
1663130473914833
connect.facebook.net/signals/config/ Frame 3D82
280 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.5&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
7709303f4e6b2e591cc3dacf550c8d0db8367b5d55e677077201d6a50c609b80
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
66234
x-xss-protection
0
pragma
public
x-fb-debug
eRFA5L+uQpwjx+ML5v8eRzoeR46uKjUiIZ6E2ZMNKZN25bes5kPOjieLofZ3uOnUDkpDVSYYRbue7AQ8izWrEg==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Mon, 21 Oct 2019 18:11:48 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/ Frame 3D82
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
f513c914f8f3cf4975bf34937100375c4b4164ec77ec011488b643452f6ae22f

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 15:13:51 GMT
Via
1.1 varnish, 1.1 281d5965f165d7acaf2c52921da12d67.cloudfront.net (CloudFront)
Age
2429877
Edge-Cache-Tag
390602458176548494884398897259766670181,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66728
X-Request-Id
44faf04ca234bc99
X-Served-By
cache-fra19143-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 15:00:59 GMT
Server
cloudinary
X-Timer
S1569251631.287169,VS0,VE180
ETag
"c43a026bdd689dfa9ab341b71ae2cd02"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
mBgGfnGdm768zjRI6Pr9R2m6wQHeOjZJ-de0o2dLTv23_aeVcYEAmw==
X-Cache-Hits
0
view
securepubads.g.doubleclick.net/pcs/ Frame D291
0
48 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsteCXEzsf76Wl4ZhNOve12sRmUQViphBauBuGPrbe-DMImBvuCSTohwtFJ0KmGRtvAzXs6JW2mmeDMH9mVQMXfd6xNDP_Fbb8Ua32qqua_2LkVGnm3eui3bsznh7DS30ADqHB1keRgbiVZQplmF4sixo5pb5-e-1GqHx_8txZp88sU7crAVJzpTtboUdo48Mg1EqpRVFSYm8pXbbQxq8CSW1KI1FqPuizE2tBziMTeMb-UH0f_8MMl5w2E3T1dmhOWI0BkWKj1oAhv8UnaHP7NjQJHUD9g74f21SvvXAmOw9bUy-gKB1Q&sai=AMfl-YQxBMgzoPCFAIZuxv5gLn6RX24h2tfkc5kpvGrYEU1xaCM3YJkpSHz8PztuQ-01H8gh4_poVaXf8A3C1oJp0MhBsQIvLZ46fLdIQcuHJw&sig=Cg0ArKJSzJ01z7N-foOIEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:47 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D291
77 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f820f689e79fe927155372514936423b30eb400c1d2b87b6503d1398f6d352c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1571051767941600"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29551
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:47 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame D291
295 KB
98 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d14b7ac07d9d07677f62a0f5c76ac8a49dc6577aabb40c11314ac779754dd464

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:47 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 00:50:48 GMT
Server
AmazonS3
x-amz-request-id
C3B4CFE8500C8079
ETag
"dbc4d2b7ee7d1f236903b70daaed2bcf"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63676
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
100316
x-amz-id-2
Rt/8JdCOSpHR33nmrksy/4bzijHa/5pMFQ+pteWuIncoCo/P3vMDHbS77DIosNrxRRq+nhOQKtw=
imgad
tpc.googlesyndication.com/pagead/ Frame D291
251 KB
252 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKCHmobreRABGAEyCG_8E4NrtMY3
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
c22caa33b00d16a07a2ce1edf9215e3fc7a061826be092ddefa9f93af011934d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 21:37:12 GMT
x-content-type-options
nosniff
server
cafe
age
419675
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-type
image/png
status
200
cache-control
public, max-age=604800
content-disposition
attachment; filename="image.png"
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
257181
x-xss-protection
0
expires
Wed, 23 Oct 2019 21:37:12 GMT
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/ Frame 3D82
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.12 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-12.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
f513c914f8f3cf4975bf34937100375c4b4164ec77ec011488b643452f6ae22f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 15:13:51 GMT
Via
1.1 varnish, 1.1 ea71ce4ac4724c3ed76f4816ddddaa6c.cloudfront.net (CloudFront)
Age
2429876
Edge-Cache-Tag
390602458176548494884398897259766670181,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66728
X-Request-Id
44faf04ca234bc99
X-Served-By
cache-fra19143-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 15:00:59 GMT
Server
cloudinary
X-Timer
S1569251631.287169,VS0,VE180
ETag
"c43a026bdd689dfa9ab341b71ae2cd02"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
_5wvRXyD5asLJs7oWJAoMw6BkVKEGIGYmmqqiTbmbesRtxkNzQxEjA==
X-Cache-Hits
0
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.4552798968.Campaign%20ID.2532006886.Line%20Item%20ID.5046266783
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.223 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:48 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A47.758Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9800&pSw=1600&pSh=1200&uID=ec5222cd-0493-4e98-b2c6-1ea6d1941a4d&uNw=1&uUq=1&pID=727d7f27-35ea-4787-9d34-6ec4d2441150&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2532006886%2C%22creativeId%22%3A138269308047%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5046266783%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681507758%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22address%22%2C%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22memory%22%2C%22function%22%2C%22processor%22%2C%22page_layout%22%2C%22program%22%2C%22linux%22%2C%22instruction%22%2C%22process%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22object%22%2C%22esp%22%2C%22problem%22%2C%22computer_security%22%2C%22internet_worm%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22fu1smxswr5d%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22f5f561c8-ba52-41f2-8b19-aa13f627c05f%22%5D%2C%22vnd_4d_pid%22%3A%5B%222475f86c-fd58-47de-883c-b22dc3b4abb5%22%5D%2C%22vnd_4d_xid%22%3A%5B%227e18c8d9-eebd-446f-b231-d8842c2e5960%22%5D%7D&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:48 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/ Frame D291
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
736faf6f3dfd09658eb08862e67a475284c24cc5d4dced50be1c0772ba3c2b80

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A47.962Z&_t=slot_loaded&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=ec5222cd-0493-4e98-b2c6-1ea6d1941a4d&sID=e039fe19-5330-4c0c-8fff-43114fc78137&pID=727d7f27-35ea-4787-9d34-6ec4d2441150&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2532006886%2C%22creativeId%22%3A138269308047%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5046266783%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681507758%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1571681507962%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22address%22%2C%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22memory%22%2C%22function%22%2C%22processor%22%2C%22page_layout%22%2C%22program%22%2C%22linux%22%2C%22instruction%22%2C%22process%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22object%22%2C%22esp%22%2C%22problem%22%2C%22computer_security%22%2C%22internet_worm%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22fu1smxswr5d%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22f5f561c8-ba52-41f2-8b19-aa13f627c05f%22%5D%2C%22vnd_4d_pid%22%3A%5B%222475f86c-fd58-47de-883c-b22dc3b4abb5%22%5D%2C%22vnd_4d_xid%22%3A%5B%227e18c8d9-eebd-446f-b231-d8842c2e5960%22%5D%7D&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:48 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
view
securepubads.g.doubleclick.net/pcs/ Frame BC23
0
152 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss5aD3Y9t1fwWCvjFPrw5RUJD5JZ-ONt3Ig8J7ECAxzQlXvQ9ZYrhxYsHyeMTY8SU_mM0J4Z_8Bg4tfFDg_nyqOQ-8xYz34igEFyFjBreFNew2nzv-Oy_WaBwPCZtZFMJ5TsYhINe2k6Fn-gi1w2TtE15thc13m0yzI40MbcnbThoRHC8uZar0c_TOHcr8jcAllyotPXCqlD7Vsmllx0yAXwUDD-CSQmV20M1N7DtPZVZlRh1QSBPhUYTQmkA8tVM6b9oZ3JvoabJcB7ySnV0sclgt3Z5-bYUGWwNFwg_rTMxuY4A&sai=AMfl-YR3fQrV0SdoQUBQrluIb0wbf_E6KTxQgLrqHrD34y-X9M46q_O7xAiThnxHghE_wfMNa27Y4MFck9uAlHRNM8d8WoKIrXOqf5bnywOX&sig=Cg0ArKJSzNcP3qOyARECEAE&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:48 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:48 GMT
window_focus.js
tpc.googlesyndication.com/pagead/js/r20191015/r20110914/client/ Frame BC23
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20191015/r20110914/client/window_focus.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
d31b12baad65082a7d404da9971cc9fed871e35f29a5893f815f468f1050491f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 15 Oct 2019 14:42:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
530963
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1044
x-xss-protection
0
server
cafe
etag
16885093947315342629
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 29 Oct 2019 14:42:25 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame BC23
77 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f820f689e79fe927155372514936423b30eb400c1d2b87b6503d1398f6d352c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1571051767941600"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29551
x-xss-protection
0
expires
Mon, 21 Oct 2019 18:11:48 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame BC23
295 KB
98 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d14b7ac07d9d07677f62a0f5c76ac8a49dc6577aabb40c11314ac779754dd464

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:47 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 00:50:48 GMT
Server
AmazonS3
x-amz-request-id
C3B4CFE8500C8079
ETag
"dbc4d2b7ee7d1f236903b70daaed2bcf"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63676
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
100316
x-amz-id-2
Rt/8JdCOSpHR33nmrksy/4bzijHa/5pMFQ+pteWuIncoCo/P3vMDHbS77DIosNrxRRq+nhOQKtw=
17761917595451946405
tpc.googlesyndication.com/simgad/ Frame BC23
221 KB
221 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/17761917595451946405
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019101401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
42a6e42dc806673c9656e5c221336100a2eed0f5dc61314397a43e9f0846e34c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 18 Oct 2019 23:14:06 GMT
x-content-type-options
nosniff
age
241061
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
225978
x-xss-protection
0
last-modified
Fri, 18 Oct 2019 16:06:43 GMT
server
sffe
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 17 Oct 2020 23:14:06 GMT
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.4552798968.Campaign%20ID.2615518737.Line%20Item%20ID.5199899035
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.223 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:48 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A47.991Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=ec5222cd-0493-4e98-b2c6-1ea6d1941a4d&sID=e039fe19-5330-4c0c-8fff-43114fc78137&pID=727d7f27-35ea-4787-9d34-6ec4d2441150&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2615518737%2C%22creativeId%22%3A138291345044%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5199899035%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681507991%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22address%22%2C%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22memory%22%2C%22function%22%2C%22processor%22%2C%22page_layout%22%2C%22program%22%2C%22linux%22%2C%22instruction%22%2C%22process%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22object%22%2C%22esp%22%2C%22problem%22%2C%22computer_security%22%2C%22internet_worm%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22fu1smxswr5d%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22f5f561c8-ba52-41f2-8b19-aa13f627c05f%22%5D%2C%22vnd_4d_pid%22%3A%5B%222475f86c-fd58-47de-883c-b22dc3b4abb5%22%5D%2C%22vnd_4d_xid%22%3A%5B%227e18c8d9-eebd-446f-b231-d8842c2e5960%22%5D%7D&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:48 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
a9c12bf3-05b3-43a6-8e1a-194eeb417679
https://arstechnica.com/
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/a9c12bf3-05b3-43a6-8e1a-194eeb417679
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
8401ff2a-2a07-4b35-96ef-42a102633be9file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/
987 KB
988 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/55d0d42c61646d257d000000/8401ff2a-2a07-4b35-96ef-42a102633be9file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.19 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-19.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
b25c06e9419f4ecc6bd6b4cbb5bd4a01054e46e98d4b262df6e8c67ee271c3c0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:49 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
Vary
Origin
X-Amz-Cf-Pop
FRA2-C1
X-Cache
Miss from cloudfront
Connection
keep-alive
Content-Length
1011064
Last-Modified
Sun, 16 Aug 2015 18:36:13 GMT
Server
AmazonS3
ETag
"3af9fb871dbc197fdb4c5dcb3d713078"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Accept-Ranges
bytes
X-Amz-Cf-Id
PFDJG7dj2KBr8hWNhjhF3gTFJxWaqX-ddg9WC6u94n4JdA_r7X9ZlA==
truncated
/ Frame BC23
207 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c8910a22831b152b7430b9f045c6aac9fbcdb3dc7e1844e523fe0971fe9f69c4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
wt
polarcdn-pentos.com/ Frame 9D18
3 B
196 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=3&n=3&p=UNKNOWN&s=1&u=ae0ed39b-36eb-4ccc-a0f5-4ff263349ba2&v=2%2F52952b0&w=1.160.1&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.47ea4034-1886-4c00-888e-29c77a9d8865.422e93&paensm=n&pai=5e87f&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=3e5085f41290c0b03aa875997f92ac93&t=arx&parcid=b23c4&parid=ce259&parin=2&partm=1&par=s&maxts=1.596&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&_=1571681506576
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Mon, 21 Oct 2019 18:11:48 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
603131
cf-ray
5295323248172748-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
c748a70c670949d1ba1f096aa6a849d6
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame 9D18
16 KB
4 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/c748a70c670949d1ba1f096aa6a849d6?order=4416eecf72b543d28b6f8d24b6338e52
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3fc112fac328b849983084948fad89e7473a5dce93c0db4b5aee9e8029a9e50b

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

timing-allow-origin
*
date
Mon, 21 Oct 2019 18:11:48 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"ac9f0e68c543dfcc7d5c54c443045d69"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=900
x-country
DE
cf-ray
529532325a238c62-VIE
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=2031134372&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-o...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_gid=649671268.1571681507&gjid=982500115&_v=j79&z=1322946017
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_v=j79&z=1322946017
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_v=j79&z=1322946017&slf_rd=1&random=3084729033
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_v=j79&z=1322946017&slf_rd=1&random=3084729033
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:48 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:48 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=2007492185.1571681506&jid=152103421&_v=j79&z=1322946017&slf_rd=1&random=3084729033
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
wt
polarcdn-pentos.com/ Frame 9D18
3 B
67 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=4&n=3&p=NA-ARSTECH-11238837&s=1&u=ae0ed39b-36eb-4ccc-a0f5-4ff263349ba2&v=2%2F52952b0&w=1.160.1&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.47ea4034-1886-4c00-888e-29c77a9d8865.422e93&paenli=19cd92073d5649d39973010253748202&paenlip=d57b9684eb874247863be631fb7330bc&paeno=4416eecf72b543d28b6f8d24b6338e52&paenop=0e57501a9cdf4b33afca49250c7f2cb7&paes=fd9a1a7c3cf24f9fb674bbc3a4ebe163&paensm=n&pai=5e87f&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&pecy=DE&c=16b1822042e34e28a4834bc0932ea6dd&pacexp=cd2dbc9cbb60416e8c5cea64bdf07bcd&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&papss=a&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&_=1571681506577
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Mon, 21 Oct 2019 18:11:48 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
603131
cf-ray
52953232c8642748-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
5d4ca34cfc70759534a8643e
polarcdn-terrax.com/image/v1.0.0/bin/
13 KB
13 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5d4ca34cfc70759534a8643e?v=a8aa4&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ef50fbb6411e721a4ac6d3c69079bee687d754e01216c093c7bdadd279e0b64a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:48 GMT
via
1.1 varnish
vary
Accept-Encoding
cf-cache-status
HIT
age
87207
status
200
content-type
image/jpeg
content-length
13232
timing-allow-origin
*
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
432000
access-control-allow-methods
GET
x-varnish
1509855912 1509561166
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
cf-ray
52953232db9859d0-VIE
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A48.361Z&_t=slot_loaded&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=ec5222cd-0493-4e98-b2c6-1ea6d1941a4d&sID=e039fe19-5330-4c0c-8fff-43114fc78137&pID=727d7f27-35ea-4787-9d34-6ec4d2441150&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2615518737%2C%22creativeId%22%3A138291345044%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5199899035%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681507991%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A1571681508152%2C%22impression%22%3A1571681508361%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22address%22%2C%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22memory%22%2C%22function%22%2C%22processor%22%2C%22page_layout%22%2C%22program%22%2C%22linux%22%2C%22instruction%22%2C%22process%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22object%22%2C%22esp%22%2C%22problem%22%2C%22computer_security%22%2C%22internet_worm%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22fu1smxswr5d%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22f5f561c8-ba52-41f2-8b19-aa13f627c05f%22%5D%2C%22vnd_4d_pid%22%3A%5B%222475f86c-fd58-47de-883c-b22dc3b4abb5%22%5D%2C%22vnd_4d_xid%22%3A%5B%227e18c8d9-eebd-446f-b231-d8842c2e5960%22%5D%7D&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:48 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A49.040Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=8e6dcf51-b77e-47f0-ac5b-779f7fb34dcd&uNw=1&uUq=1&pID=5610ee82-4f8b-4768-bdff-f3d06a0ac5b6&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2532006886%2C%22creativeId%22%3A138269308047%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5046266783%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681507758%2C%22viewable%22%3A1571681509040%2C%22viewport%22%3A1571681508005%2C%22impression%22%3A1571681507962%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22address%22%2C%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22memory%22%2C%22function%22%2C%22processor%22%2C%22page_layout%22%2C%22program%22%2C%22linux%22%2C%22instruction%22%2C%22process%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22object%22%2C%22esp%22%2C%22problem%22%2C%22computer_security%22%2C%22internet_worm%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22fu1smxswr5d%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22f5f561c8-ba52-41f2-8b19-aa13f627c05f%22%5D%2C%22vnd_4d_pid%22%3A%5B%222475f86c-fd58-47de-883c-b22dc3b4abb5%22%5D%2C%22vnd_4d_xid%22%3A%5B%227e18c8d9-eebd-446f-b231-d8842c2e5960%22%5D%7D&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:49 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame D291
42 B
600 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvoxN2rAq-a-9uDtzjOmdXyPbnkhlwrx1lmJ1Lt96zG4Y2oG6X2lFw_Qky4_ZBy5D7U5GD8LcIF9uyinVlG6ZIg5DmqI5UmWkkEIqyO2Nw&sig=Cg0ArKJSzPwAMJVevmOxEAE&adk=1483574547&tt=-1&bs=1585%2C1200&mtos=0,1035,1035,1035,1035&tos=0,1035,0,0,0&p=370,1063,970,1363&mcvt=1035&rs=3&ht=0&tfs=1597&tls=2632&mc=0.99&lte=1&bas=0&bac=0&met=no&avms=nio&niot_obs=1350&niot_cbk=1372&md=2&lm=2&rst=1571681507728&rpt=153&isd=0&msd=0&oseid=3&xdi=0&xosd=1&ps=1585%2C9906&ss=1600%2C1200&pt=-1&bin=1&deb=1-1-3-12-17-15-54-16-0-0-0&tvt=2623&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&clc=1&cac=1&cd=0x0&itpl=19&v=20191014
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:49 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1571681505347&de=195549176379&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=7392b0f-clean&zMoatDfpSlotId=siderail_0&zMoatRendered=3&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=3&zMoatPageDataTargetingSet=3&zMoatSafetyTargetingSet=3&zMoatEmptySlot=1&zMoatNadoDataLoadTime=365&zMoatAllDataLoadTime=365&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&ac=1&bq=11&f=0&zn=0&if=365&na=1566799043&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:49 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:49 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1571681505347&de=195549176379&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=7392b0f-clean&zMoatDfpSlotId=post_nav_0&zMoatRendered=4&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=4&zMoatPageDataTargetingSet=4&zMoatSafetyTargetingSet=4&zMoatEmptySlot=1&zMoatNadoDataLoadTime=365&zMoatAllDataLoadTime=365&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&ac=1&bq=11&f=0&zn=0&if=365&na=188650588&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:49 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:49 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A49.171Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=8e6dcf51-b77e-47f0-ac5b-779f7fb34dcd&sID=3dbe4714-efd0-405a-8b33-9ae808f2bed5&pID=5610ee82-4f8b-4768-bdff-f3d06a0ac5b6&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2615518737%2C%22creativeId%22%3A138291345044%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5199899035%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22how-security-flaws-work-the-buffer-overflow%22%7D&dim3=%7B%22footerStart%22%3A1571681505331%2C%22headerStart%22%3A1571681505315%2C%22navigationStart%22%3A1571681504785%2C%22pubAdsReady%22%3A1571681505572%2C%22injected%22%3A1571681507991%2C%22viewable%22%3A1571681509171%2C%22viewport%22%3A1571681508152%2C%22impression%22%3A1571681508361%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22how-security-flaws-work-the-buffer-overflow%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22page_layout%22%2C%22linux%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22computer_security%22%2C%22internet_worm%22%2C%22windows%22%2C%22unix%22%2C%22peter_bright%22%2C%22home_and_small_office_router%22%2C%22utc%22%2C%22java%22%2C%22python%22%2C%22keyboard%22%2C%22css%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22address%22%2C%22buffer_overflow%22%2C%22system%22%2C%22morris_worm%22%2C%22memory%22%2C%22function%22%2C%22processor%22%2C%22page_layout%22%2C%22program%22%2C%22linux%22%2C%22instruction%22%2C%22process%22%2C%22machine_to_machine%22%2C%22native_code%22%2C%22daemon%22%2C%22object%22%2C%22esp%22%2C%22problem%22%2C%22computer_security%22%2C%22internet_worm%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22120000%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22131135%22%2C%22210001%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22v8lc56%22%2C%2265f9pd%22%2C%22awpwvf%22%2C%22fu1smxswr5d%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22f5f561c8-ba52-41f2-8b19-aa13f627c05f%22%5D%2C%22vnd_4d_pid%22%3A%5B%222475f86c-fd58-47de-883c-b22dc3b4abb5%22%5D%2C%22vnd_4d_xid%22%3A%5B%227e18c8d9-eebd-446f-b231-d8842c2e5960%22%5D%7D&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:49 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame BC23
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstvBX5ucLXq78V8a0sEgMxoon60uL7hAs9jBivCwXUv90lROt1bBvKNmkgqNo3Wyf__b2KuCi0Fu8J58NmDR3MWulDVRM6SYLIW4DeLz0c&sig=Cg0ArKJSzM2saEOP-jzuEAE&adk=2385402828&tt=-1&bs=1585%2C1200&mtos=1019,1019,1019,1019,1019&tos=1019,0,0,0,0&p=80,429,170,1157&mcvt=1019&rs=3&ht=0&tfs=1744&tls=2763&mc=1&lte=1&bas=0&bac=0&met=no&avms=nio&niot_obs=1584&niot_cbk=1671&md=2&lm=2&rst=1571681507987&rpt=120&isd=0&msd=0&oseid=3&xdi=0&xosd=1&ps=1585%2C9906&ss=1600%2C1200&pt=-1&bin=1&deb=1-1-3-13-18-15-57-17-0-0-0&tvt=2754&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&clc=1&cac=1&cd=728x90&itpl=3&v=20191014
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:49 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.29.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-29-231.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Mon, 21 Oct 2019 18:11:49 GMT
x-content-type-options
nosniff
Server
nginx/1.15.8
x-frame-options
DENY
x-download-options
noopen
vary
origin
Connection
keep-alive
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
strict-transport-security
max-age=15768000; preload
x-xss-protection
1; mode=block
ads
pubads.g.doubleclick.net/gampad/
6 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dhow-security-flaws-work-the-buffer-overflow%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_entities%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_keywords%3Daddress%252Cbuffer_overflow%252Csystem%252Cmorris_worm%252Cmemory%252Cfunction%252Cprocessor%252Cpage_layout%252Cprogram%252Clinux%252Cinstruction%252Cprocess%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Cobject%252Cesp%252Cproblem%252Ccomputer_security%252Cinternet_worm%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C120000%252C121100%252C131100%252C131103%252C131135%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252C2hkgm5%252Cap05we%252Cv8lc56%252C65f9pd%252Cawpwvf%252Cfu1smxswr5d%26ctx_advertisers%3D1454517775%26ctx_line_items%3D4736014287%26ctx_creatives%3D138237302059%26vnd_4d_sid%3Df5f561c8-ba52-41f2-8b19-aa13f627c05f%26vnd_4d_pid%3D2475f86c-fd58-47de-883c-b22dc3b4abb5%26vnd_4d_xid%3D7e18c8d9-eebd-446f-b231-d8842c2e5960%26height%3D450%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26series%3D55ccff6661646d7f13000025%26width%3D800&correlator=2237722942949477&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fhow-the-stack-works-part-1&vid=55d0d42c61646d257d000000&cmsid=1495&ppid=7e18c8d9eebd446fb231d8842c2e5960
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
3e6768dbb7e629c870d787433bf117b2108223e9c21e840a9610120a801fc906
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:49 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1343
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A49.914Z&_c=timedOut&_t=gptData&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fars.dart%2Finformation-technology%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%224736014287%22%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%2255d0d42c61646d257d000000%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:49 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/
282 KB
94 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
986a0497ee1868674495c262db7f3718c7afbf8f062df9fdc721a1951894f11c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:50 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 00:50:50 GMT
Server
AmazonS3
x-amz-request-id
64BFDC8426F08910
ETag
"740eae5d5ac4f0c2001ed2f19f6ea91b"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63531
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95903
x-amz-id-2
PNTCI3eCKIbmLosm6Tg5uUNPsShenoZYMTu+4Xx8830/VPNaBTFnnJcui2gK55HHz5r77jiPlnM=
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=2031134372&t=event&ni=1&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overf...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_gid=113353096.1571681510&gjid=1830695398&_v=j79&z=1543815984
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_v=j79&z=1543815984
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_v=j79&z=1543815984&slf_rd=1&random=812752255
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_v=j79&z=1543815984&slf_rd=1&random=812752255
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:50 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:50 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2007492185.1571681506&jid=372130125&_v=j79&z=1543815984&slf_rd=1&random=812752255
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A50.010Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fhow-the-stack-works-part-1%2F&cId=55d0d42c61646d257d000000&cKe=&cPd=2015-08-16T18%3A19%3A24%2B00%3A00&cTi=1.%20How%20Buffer%20Overflows%20work%3A%20the%20stack&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=477&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=800&pWh=450&xid=7e18c8d9-eebd-446f-b231-d8842c2e5960&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22836a6f8%22%2C%22guid%22%3A%2262a4c963-899a-f6b5-c18f-8063c0315a6d%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A4369.515625%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Cfeature%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Cfeature
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1571681510035&de=602105900235&m=0&ar=6907c9d928-clean&iw=7740da1&q=11&cb=0&ym=0&cu=1571681510035&ll=2&lm=0&ln=0&r=0&em=0&en=0&d=1.%20How%20Buffer%20Overflows%20work_%20the%20stack%3A%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=55d0d42c61646d257d000000&zMoatAP=-&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&fs=173050&na=2144700207&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:50 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:50 GMT
ads
pubads.g.doubleclick.net/gampad/ Frame 3D82
6 KB
1 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dhow-security-flaws-work-the-buffer-overflow%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_entities%3Dbuffer_overflow%252Csystem%252Cmorris_worm%252Cpage_layout%252Clinux%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Ccomputer_security%252Cinternet_worm%252Cwindows%252Cunix%252Cpeter_bright%252Chome_and_small_office_router%252Cutc%252Cjava%252Cpython%252Ckeyboard%252Ccss%26vnd_4d_ctx_keywords%3Daddress%252Cbuffer_overflow%252Csystem%252Cmorris_worm%252Cmemory%252Cfunction%252Cprocessor%252Cpage_layout%252Cprogram%252Clinux%252Cinstruction%252Cprocess%252Cmachine_to_machine%252Cnative_code%252Cdaemon%252Cobject%252Cesp%252Cproblem%252Ccomputer_security%252Cinternet_worm%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C120000%252C121100%252C131100%252C131103%252C131135%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252C2hkgm5%252Cap05we%252Cv8lc56%252C65f9pd%252Cawpwvf%252Cfu1smxswr5d%26ctx_advertisers%3D1454517775%26ctx_line_items%3D4736014287%26ctx_creatives%3D138237302059%26vnd_4d_sid%3Df5f561c8-ba52-41f2-8b19-aa13f627c05f%26vnd_4d_pid%3D2475f86c-fd58-47de-883c-b22dc3b4abb5%26vnd_4d_xid%3D7e18c8d9-eebd-446f-b231-d8842c2e5960%26height%3D304%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26series%3D5c82bd18bcdfff6f1f2fc5e7%26width%3D540&correlator=2237722942949477&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fwar-stories-civilization&vid=5d826c83bcdfff482d6d06b0&cmsid=1495&ppid=3565b8da9e354593945e5cc45a22c826
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
7088c852342dd777b2f6f1278d895932e6efd57ca5d3abca8886aced9ea43b9e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:11:50 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1355
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame 3D82
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A50.290Z&_c=timedOut&_t=gptData&sID=d8d97995-ec8e-40ad-96be-c1abb2263280&pID=08aebb37-8c83-4610-9bfd-452f023b84d1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fars.dart%2Finformation-technology%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%224736014287%22%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225d826c83bcdfff482d6d06b0%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Mon, 21 Oct 2019 18:11:50 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame 3D82
282 KB
94 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
986a0497ee1868674495c262db7f3718c7afbf8f062df9fdc721a1951894f11c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:50 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 00:50:50 GMT
Server
AmazonS3
x-amz-request-id
64BFDC8426F08910
ETag
"740eae5d5ac4f0c2001ed2f19f6ea91b"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63531
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95903
x-amz-id-2
PNTCI3eCKIbmLosm6Tg5uUNPsShenoZYMTu+4Xx8830/VPNaBTFnnJcui2gK55HHz5r77jiPlnM=
track
capture.condenastdigital.com/ Frame 3D82
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-10-21T18%3A11%3A50.360Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-civilization%2F&cId=5d826c83bcdfff482d6d06b0&cKe=&cPd=2019-09-23T15%3A00%3A00%2B00%3A00&cTi=Civilization%3A%20It%27s%20good%20to%20take%20turns%20%7C%20War%20Stories&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=734&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pID=08aebb37-8c83-4610-9bfd-452f023b84d1&pWw=540&pWh=303.75&sID=d8d97995-ec8e-40ad-96be-c1abb2263280&uId=250888aa-8bcc-4073-bdf3-f2c607f65752&xid=3565b8da-9e35-4593-945e-5cc45a22c826&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22836a6f8%22%2C%22guid%22%3A%2272f6caa5-ad02-2f92-2d64-ef22ac24f%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A8491.859375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Cfeature%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Cfeature
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1571681510377&de=83934748719&m=0&ar=6907c9d928-clean&iw=7740da1&q=14&cb=0&ym=0&cu=1571681510377&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=Civilization_%20It%27s%20good%20to%20take%20turns%20%7C%20War%20Stories%3A%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=5d826c83bcdfff482d6d06b0&zMoatAP=-&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&fs=173050&na=847517121&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:11:50 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Mon, 21 Oct 2019 18:11:50 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-10-21T18%3A11%3A52.596Z&_t=timespent&cBr=Ars%20Technica&cCh=information%20technology&cTi=How%20security%20flaws%20work%3A%20The%20buffer%20overflow&cTy=article%7Cfeature&cTp=ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.2811293951413898%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365%2C%200.24355107735787365&cEnt=buffer%20overflow%2C%20system%2C%20morris%20worm%2C%20page%20layout%2C%20linux%2C%20machine%20to%20machine%2C%20native%20code%2C%20daemon%2C%20computer%20security%2C%20internet%20worm%2C%20windows%2C%20unix%2C%20peter%20bright%2C%20home%20and%20small%20office%20router%2C%20utc%2C%20java%2C%20python%2C%20keyboard%2C%20css&cEnw=0.9725207612938342%2C%200.7280472472595414%2C%200.7272207706126201%2C%200.6469123716732528%2C%200.6035569601511643%2C%200.5275083495859807%2C%200.5061358136109845%2C%200.49647857589913214%2C%200.4477320177818302%2C%200.43505755011591135%2C%200.4311222823503982%2C%200.4254532553079177%2C%200.41415407473494126%2C%200.39501011419451815%2C%200.38514654580461904%2C%200.354999734106597%2C%200.3547977865800514%2C%200.3510652931120692%2C%200.24258932955650372&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&cCl=9055&cId=679043&cPd=2015-08-26T01%3A00%3A56.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&pRt=referral&pHp=%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&pWw=1600&pWh=1200&pPw=1600&pPh=9900&pSw=1600&pSh=1200&uID=43d760dd-eab3-4d1c-b891-42b524fb70ee&uNw=1&uUq=1&pID=18464360-059d-47bb-9788-c3400c7a7a9a&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=7e18c8d9-eebd-446f-b231-d8842c2e5960&_v=5000&cKh=address%2Cbuffer%20overflow%2Csystem%2Cmorris%20worm%2Cmemory%2Cfunction%2Cprocessor%2Cpage%20layout%2Cprogram%2Clinux
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 21 Oct 2019 18:11:52 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=74&profileId=154&cb=2366023266
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Mon, 21 Oct 2019 18:11:56 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=74&profileId=154&cb=5079825450
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Mon, 21 Oct 2019 18:11:56 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
pixel.gif
v4.moatads.com/
0
0

/
srv-2019-10-21-18.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-10-21-18.pixel.parsely.com/plogger/?rand=1571681518163&plid=69732286&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%22e43c83af-a4bc-48a6-9f2e-4ae201958d3b%22%2C%22parsely_site_uuid%22%3A%22dffc2b8a-d8ad-4122-99e9-6645c032f06a%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&sref=&sts=1571681518163&slts=0&date=Mon+Oct+21+2019+20%3A11%3A58+GMT%2B0200+(Central+European+Summer+Time)&action=heartbeat&inc=5&tt=4900&pvid=62389175&u=dffc2b8a-d8ad-4122-99e9-6645c032f06a
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.197.187 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-197-187.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:11:32 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
pixel.gif
v4.moatads.com/
0
0

pixel.gif
v4.moatads.com/
0
0

pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=17&i=CONDECW3&hp=1&wf=1&vb=5&cm=4&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1571681507031&de=147246791297&m=0&ar=6907c9d928-clean&iw=d6d274e&q=2&cb=0&ym=0&cu=1571681507031&ll=2&lm=0&ln=1&em=0&en=0&d=1454517775%3A2338761482%3A4736014287%3A138237302059&zMoatPS=native_xrail_0&zMoatPT=article&zMoatST=native_xrail&zMoatCNS=6.30.9&zMoatSZ=300x140&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&zMoatPlacID=14232775&bo=14232775&bp=14232775&bd=Undefined&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=14232775&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&zMoatOrigSlicer1=14232775&zMoatOrigSlicer2=14232775&gw=condenastdfp9588492144&fd=1&ac=1&it=500&ti=0&ih=1&iq=na&tt=na&fs=173050&na=464846571&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.175.148.181 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-175-148-181.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:12:14 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=11&i=CONDECW3&hp=1&wf=1&vb=5&cm=4&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1571681507031&de=147246791297&m=0&ar=6907c9d928-clean&iw=d6d274e&q=15&cb=0&ym=0&cu=1571681507031&ll=2&lm=0&ln=1&em=0&en=0&d=1454517775%3A2338761482%3A4736014287%3A138237302059&zMoatPS=native_xrail_0&zMoatPT=article&zMoatST=native_xrail&zMoatCNS=6.30.9&zMoatSZ=300x140&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&zMoatPlacID=14232775&bo=14232775&bp=14232775&bd=Undefined&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=14232775&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&zMoatOrigSlicer1=14232775&zMoatOrigSlicer2=14232775&gw=condenastdfp9588492144&fd=1&ac=1&it=500&ti=0&ih=1&iq=na&tt=na&fs=173050&na=592695371&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.175.148.181 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-175-148-181.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:12:14 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=5&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fpagead%2Fimgad%3Fid%3DCICAgKCHmobreRABGAEyCG_8E4NrtMY3&i=CONDECW3&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=%7CISyPo7FlK&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&cm=0&f=0&j=&t=1571681507888&de=866464573674&cu=1571681507888&m=15202&ar=6907c9d928-clean&iw=d6d274e&cb=0&ym=0&ll=2&lm=0&ln=1&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=9906&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=15190&an=10170&gi=1&gf=15190&gg=10170&ix=15190&ic=15190&ez=1&ck=1087&kw=867&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15190&bx=10170&ci=1087&jz=867&dj=1&aa=1&ad=15085&cn=10065&gn=1&gk=15085&gl=10065&ik=15085&co=1216&cp=1091&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14993&cd=9973&ah=14993&am=9973&rf=0&re=1&ft=6727&fv=6727&fw=755&wb=2&cl=0&at=0&d=4552798968%3A2532006886%3A5046266783%3A138269308047&zMoatPlacID=21711241635&bo=21698048816&bp=21711241635&bd=Undefined&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241635&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241635&zMoatPS=siderail_0&zMoatCNS=6.30.9&zMoatSZ=300x600&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&dfpSlotId=siderail_0&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=siderail_0&iq=na&tt=na&tc=0&fs=173050&zid=CICAgKCHmobreRABGAEyCG_8E4NrtMY3&na=1641410330&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.175.148.181 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-175-148-181.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:12:14 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=5&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F17761917595451946405&i=CONDECW3&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=%7CISyPo7FlK&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&cm=0&f=0&j=&t=1571681508155&de=999768590309&cu=1571681508155&m=15138&ar=6907c9d928-clean&iw=d6d274e&cb=0&ym=0&ll=2&lm=0&ln=1&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=9906&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=15130&an=10109&gi=1&gf=15130&gg=10109&ix=15130&ic=15130&ez=1&ck=1060&kw=842&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15130&bx=10109&ci=1060&jz=842&dj=1&aa=1&ad=15022&cn=10001&gn=1&gk=15022&gl=10001&ik=15022&co=1156&cp=1062&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14931&cd=9910&ah=14931&am=9910&rf=0&re=1&ft=4828&fv=4828&fw=3112&wb=2&cl=0&at=0&d=4552798968%3A2615518737%3A5199899035%3A138291345044&zMoatPlacID=21711241029&bo=21698048816&bp=21711241029&bd=Undefined&zMoatPT=article&zMoatST=post_nav&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241029&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241029&zMoatPS=post_nav_0&zMoatCNS=6.30.9&zMoatSZ=728x90&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&dfpSlotId=post_nav_0&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=post_nav_0&iq=na&tt=na&tc=0&fs=173050&na=153628041&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.175.148.181 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-175-148-181.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 21 Oct 2019 18:12:14 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
cs.js
sb.scorecardresearch.com/c2/6035094/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/6035094/cs.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:12:14 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Thu, 24 Oct 2019 18:12:14 GMT
adsct
analytics.twitter.com/i/
31 B
635 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1o49&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:12:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
136
pragma
no-cache
last-modified
Mon, 21 Oct 2019 18:12:14 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
38ed63b8790c5df7c57b991fe6a50db6
x-transaction
00d404d700eef910
expires
Tue, 31 Mar 1981 05:00:00 GMT
/
www.facebook.com/tr/
44 B
201 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=Spire-Studio-Segment&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&rl=&if=false&ts=1571681534881&cd[code]=&sw=1600&sh=1200&v=2.9.5&r=stable&ec=2&o=30&fbp=fb.1.1571681534880.1057000910&it=1571681505865&coo=false&rqm=GET
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:12:14 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Mon, 21 Oct 2019 18:12:14 GMT
/
www.facebook.com/tr/
44 B
346 B
Image
General
Full URL
https://www.facebook.com/tr/?id=1663130473914833&ev=Spire-Studio-Segment&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&rl=&if=false&ts=1571681534882&cd[code]=&sw=1600&sh=1200&v=2.9.5&r=stable&ec=0&o=30&fbp=fb.1.1571681534880.1057000910&it=1571681505865&coo=false&rqm=GET
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 21 Oct 2019 18:12:14 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Mon, 21 Oct 2019 18:12:14 GMT
event
condenast.demdex.net/
6 KB
6 KB
XHR
General
Full URL
https://condenast.demdex.net/event?_ts=1571681534903
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.90.74 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-90-74.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ebe634c19dfef5e534dff6b099490974d3c3637570a57fe464db9787c64e3f63
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v048-02e9a269f.edge-irl1.demdex.com 5.61.0.20191015084456 8ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-TID
a1ImcN2oTEo=
Vary
Origin
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
5740
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
www.facebook.com/tr/ Frame F75E
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
2395
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/
accept-encoding
gzip, deflate, br
cookie
fr=0XaIPI8skKIFYaaMy..BdrfT-...1.0.BdrfT-.
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
content-length
0
server
proxygen-bolt
alt-svc
h3-23=":443"; ma=3600
date
Mon, 21 Oct 2019 18:12:15 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
mid.rkdms.com
URL
https://mid.rkdms.com/ids?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Domain
api.rlcdn.com
URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.3181553720609913&alt_size_ids=10
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.7776296200240003&alt_size_ids=57
Domain
v4.moatads.com
URL
https://v4.moatads.com/pixel.gif?e=17&i=CONDECW3&hp=1&wf=1&vb=5&cm=4&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1571681507031&de=147246791297&m=0&ar=6907c9d928-clean&iw=d6d274e&q=2&cb=0&ym=0&cu=1571681507031&ll=2&lm=0&ln=1&em=0&en=0&d=1454517775%3A2338761482%3A4736014287%3A138237302059&zMoatPS=native_xrail_0&zMoatPT=article&zMoatST=native_xrail&zMoatCNS=6.30.9&zMoatSZ=300x140&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&zMoatPlacID=14232775&bo=14232775&bp=14232775&bd=Undefined&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=14232775&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&zMoatOrigSlicer1=14232775&zMoatOrigSlicer2=14232775&gw=condenastdfp9588492144&fd=1&ac=1&it=500&ti=0&ih=1&iq=na&tt=na&fs=173050&na=464846571&cs=0
Domain
v4.moatads.com
URL
https://v4.moatads.com/pixel.gif?e=11&i=CONDECW3&hp=1&wf=1&vb=5&cm=4&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1571681507031&de=147246791297&m=0&ar=6907c9d928-clean&iw=d6d274e&q=15&cb=0&ym=0&cu=1571681507031&ll=2&lm=0&ln=1&em=0&en=0&d=1454517775%3A2338761482%3A4736014287%3A138237302059&zMoatPS=native_xrail_0&zMoatPT=article&zMoatST=native_xrail&zMoatCNS=6.30.9&zMoatSZ=300x140&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&zMoatPlacID=14232775&bo=14232775&bp=14232775&bd=Undefined&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=14232775&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&zMoatOrigSlicer1=14232775&zMoatOrigSlicer2=14232775&gw=condenastdfp9588492144&fd=1&ac=1&it=500&ti=0&ih=1&iq=na&tt=na&fs=173050&na=592695371&cs=0
Domain
v4.moatads.com
URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=5&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fpagead%2Fimgad%3Fid%3DCICAgKCHmobreRABGAEyCG_8E4NrtMY3&i=CONDECW3&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=%7CISyPo7FlK&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&cm=0&f=0&j=&t=1571681507888&de=866464573674&cu=1571681507888&m=15202&ar=6907c9d928-clean&iw=d6d274e&cb=0&ym=0&ll=2&lm=0&ln=1&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=9906&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=15190&an=10170&gi=1&gf=15190&gg=10170&ix=15190&ic=15190&ez=1&ck=1087&kw=867&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15190&bx=10170&ci=1087&jz=867&dj=1&aa=1&ad=15085&cn=10065&gn=1&gk=15085&gl=10065&ik=15085&co=1216&cp=1091&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14993&cd=9973&ah=14993&am=9973&rf=0&re=1&ft=6727&fv=6727&fw=755&wb=2&cl=0&at=0&d=4552798968%3A2532006886%3A5046266783%3A138269308047&zMoatPlacID=21711241635&bo=21698048816&bp=21711241635&bd=Undefined&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241635&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241635&zMoatPS=siderail_0&zMoatCNS=6.30.9&zMoatSZ=300x600&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&dfpSlotId=siderail_0&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=siderail_0&iq=na&tt=na&tc=0&fs=173050&zid=CICAgKCHmobreRABGAEyCG_8E4NrtMY3&na=1641410330&cs=0
Domain
v4.moatads.com
URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=5&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F17761917595451946405&i=CONDECW3&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=%7CISyPo7FlK&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow%2F&id=1&cm=0&f=0&j=&t=1571681508155&de=999768590309&cu=1571681508155&m=15138&ar=6907c9d928-clean&iw=d6d274e&cb=0&ym=0&ll=2&lm=0&ln=1&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=9906&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=15130&an=10109&gi=1&gf=15130&gg=10109&ix=15130&ic=15130&ez=1&ck=1060&kw=842&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15130&bx=10109&ci=1060&jz=842&dj=1&aa=1&ad=15022&cn=10001&gn=1&gk=15022&gl=10001&ik=15022&co=1156&cp=1062&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14931&cd=9910&ah=14931&am=9910&rf=0&re=1&ft=4828&fv=4828&fw=3112&wb=2&cl=0&at=0&d=4552798968%3A2615518737%3A5199899035%3A138291345044&zMoatPlacID=21711241029&bo=21698048816&bp=21711241029&bd=Undefined&zMoatPT=article&zMoatST=post_nav&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241029&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241029&zMoatPS=post_nav_0&zMoatCNS=6.30.9&zMoatSZ=728x90&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&dfpSlotId=post_nav_0&zMoatCURL=arstechnica.com%2Finformation-technology%2F2015%2F08%2Fhow-security-flaws-work-the-buffer-overflow&zMoatDev=Desktop&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=post_nav_0&iq=na&tt=na&tc=0&fs=173050&na=153628041&cs=0

Verdicts & Comments Add Verdict or Comment

200 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| ars object| dataLayer object| googletag object| cns object| sparrowQueue object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken boolean| apstagLOADED object| apstag object| cnBus function| moatYieldReady object| _perfRefForUserTimingPolyfill object| __core-js_shared__ object| core object| fastdom object| BOOMR_mq object| regeneratorRuntime object| headertag undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| pxSrc undefined| px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_2352920 boolean| Moat#EVA object| moatPrebidApi object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady26487458 object| google_tag_manager object| CN number| google_srt undefined| google_measure_js_timing boolean| google_noFetch number| __google_ad_urls_id function| gotSegmentData function| e object| visitor function| Visitor object| s_c_il number| s_c_in function| DIL object| dilInstance string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga object| _qevents object| __adIq_Config string| b object| h object| _aam_dataLayer undefined| userId boolean| _aam_spa function| fbq function| _fbq function| twq function| getVisitNumCustom number| d string| _linkedin_partner_id object| _linkedin_data_partner_ids object| AIM function| snaptr object| r function| addPixel object| ActionButton object| __SKIM_JS_GLOBAL__ object| skimlinksAPI object| _cne function| __cmp number| char object| PolarConde object| NATIVEADS object| NATIVEADS_QUEUE number| google_unique_id object| google_reactive_ads_global_state object| gaGlobal string| hash object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| google_tag_data object| gaplugins object| PARSELY object| SparrowConfigV2 object| twttr function| quantserve function| __qc object| ezt object| _qoptions function| lintrk boolean| _already_called_lintrk object| bouncex function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| sparrow object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired object| NATIVEADS_STORE boolean| ab_isEventListenerAddedForWidgetVisible_action-button-react-iframe object| Criteo function| headertag_render object| rubicontag object| gaData function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie object| _google_rum_ns_ object| google_persistent_state_async number| google_global_correlator function| mb function| Goog_AdSense_Lidar_sendVastEvent function| Goog_AdSense_Lidar_getViewability function| Goog_AdSense_Lidar_getUrlSignalsArray function| Goog_AdSense_Lidar_getUrlSignalsList object| ima object| google function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| _0x550c function| _0x56ae object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate boolean| _babelPolyfill number| vdata1571681506493 object| vttjs function| WebVTT object| criteo_pubtag object| Sailthru function| docReady undefined| a undefined| c function| jsonFeed object| OneTrust object| Optanon string| OnetrustActiveGroups string| OptanonActiveGroups function| OptanonWrapper object| closure_lm_172906 object| closure_lm_270038 object| NOLBUNDLE object| auvars object| ns_ object| closure_lm_440293 object| au object| closure_lm_658210 string| key undefined| GLOBAL_VAR undefined| isBeta undefined| viewHash object| Moat#PML#26#1.2 function| arrive function| unbindArrive function| leave function| unbindLeave

8 Cookies

Domain/Path Name / Value
.arstechnica.com/ Name: aamoptsegs
Value: aam%3D226821
.arstechnica.com/ Name: _fbp
Value: fb.1.1571681534880.1057000910
.arstechnica.com/ Name: aamconde
Value: conde%3Dsv
.arstechnica.com/ Name: paulcncookie
Value: segID%3D14045966
.demdex.net/ Name: demdex
Value: 62679995799542354163685637680468357518
.arstechnica.com/ Name: aam_uuid
Value: 62679995799542354163685637680468357518
.arstechnica.com/ Name: OptanonConsent
Value: groups=1%3A1%2C2%3A1%2C3%3A1%2C4%3A1%2C0_90183%3A1%2C0_90185%3A1%2C0_90179%3A1%2C0_90181%3A1%2C0_90158%3A1%2C0_90160%3A1%2C0_90187%3A1%2C0_90189%3A1%2C0_90156%3A1%2C0_90167%3A1%2C0_90169%3A1%2C0_90163%3A1%2C0_90165%3A1%2C0_90175%3A1%2C0_90177%3A1%2C0_90171%3A1%2C0_90173%3A1%2C0_90182%3A1%2C0_90184%3A1%2C0_90178%3A1%2C0_90180%3A1%2C0_90159%3A1%2C0_90161%3A1%2C0_90155%3A1%2C0_90186%3A1%2C0_90157%3A1%2C0_90188%3A1%2C0_90166%3A1%2C0_90168%3A1%2C0_90162%3A1%2C0_90164%3A1%2C0_90174%3A1%2C0_90176%3A1%2C0_90170%3A1%2C0_90172%3A1&datestamp=Mon+Oct+21+2019+20%3A12%3A14+GMT%2B0200+(Central+European+Summer+Time)&version=5.2.0
arstechnica.com/ Name: GED_PLAYLIST_ACTIVITY
Value: W3sidSI6ImNPOGsiLCJ0c2wiOjE1NzE2ODE1MzUsIm52IjowLCJ1cHQiOjE1NzE2ODE1MDcsImx0IjoxNTcxNjgxNTA3fV0.

1 Console Messages

Source Level URL
Text
console-api warning URL: https://connect.facebook.net/en_US/fbevents.js(Line 24)
Message:
[Facebook Pixel] - Duplicate Pixel ID: 228464857488266.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
a.ad.gt
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ak.sail-horizon.com
ampcid.google.com
ampcid.google.de
analytics.twitter.com
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
assets.bounceexchange.com
bidder.criteo.com
bw-prod.plrsrvcs.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.arstechnica.net
cdn.mediavoice.com
cm.everesttech.net
cm.g.doubleclick.net
code.jquery.com
condenast.demdex.net
connect.facebook.net
cs.emxdgt.com
csi.gstatic.com
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dpm.demdex.net
dwgyu36up6iuz.cloudfront.net
embed.actionbutton.co
fastlane.rubiconproject.com
geolocation.onetrust.com
ib.adnxs.com
ids.ad.gt
image2.pubmatic.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
match.deepintent.com
mb.moatads.com
mcdp-nydc1.outbrain.com
mid.rkdms.com
odb.outbrain.com
optanon.blob.core.windows.net
p.ad.gt
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
pixel.quantserve.com
pixel.tapad.com
pixels.ad.gt
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
prod-native.actionbutton.co
pubads.g.doubleclick.net
px.ads.linkedin.com
px.moatads.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
sc-static.net
sd.turn.com
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
srv-2019-10-21-18.config.parsely.com
srv-2019-10-21-18.pixel.parsely.com
sstats.arstechnica.com
static.ads-twitter.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
t.co
t.skimresources.com
tag.bounceexchange.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
tr.snapchat.com
v4.moatads.com
widgets.outbrain.com
wren.condenastdigital.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
www.medtargetsystem.com
z.moatads.com
api.rlcdn.com
fastlane.rubiconproject.com
mid.rkdms.com
v4.moatads.com
104.17.193.78
104.244.42.131
104.244.42.133
13.224.196.19
13.225.74.186
13.225.78.106
13.225.78.46
143.204.101.45
143.204.98.215
151.101.114.2
151.101.12.157
151.101.12.239
151.139.128.10
152.199.22.24
172.217.16.162
172.217.16.194
172.217.21.226
178.250.0.165
178.250.2.130
18.195.155.181
185.33.223.100
185.64.189.110
2.18.232.28
2.18.234.190
2.18.234.21
2.18.235.40
2.19.43.224
2001:4de0:ac19::1:b:3a
205.234.175.175
2404:6800:4012:1::2003
2600:9000:200c:5800:11:8cf6:b500:93a1
2600:9000:2156:2200:6:44e3:f8c0:93a1
2606:4700:10::6814:b844
2606:4700::6811:4032
2606:4700::6811:dc0f
2606:4700::6813:da83
2606:4700::6813:f87e
2a00:1450:4001:800::2002
2a00:1450:4001:800::2004
2a00:1450:4001:800::200e
2a00:1450:4001:806::2001
2a00:1450:4001:806::2006
2a00:1450:4001:819::2003
2a00:1450:4001:81a::2008
2a00:1450:4001:81c::2002
2a00:1450:4001:81f::200a
2a00:1450:4001:81f::200e
2a00:1450:4001:824::2002
2a00:1450:4001:825::200e
2a00:1450:400c:c00::9d
2a02:26f0:6c00:296::25ea
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a05:f500:10:101::b93f:9101
2a05:f500:10:101::b93f:9105
3.8.71.160
34.199.176.61
34.230.155.118
34.240.220.248
34.241.149.220
34.98.72.95
35.161.253.167
35.165.247.37
35.175.148.181
35.186.226.184
35.190.40.172
35.190.59.101
35.190.92.63
35.201.67.47
35.227.248.159
37.252.173.22
46.228.164.13
46.228.164.27
50.31.169.131
52.1.219.33
52.10.35.234
52.206.179.81
52.212.90.74
52.239.137.4
52.49.48.201
52.5.37.73
52.6.202.179
52.86.197.187
52.86.29.231
54.192.94.12
54.192.94.44
54.230.95.177
54.69.119.154
54.76.0.5
63.140.41.50
66.117.28.86
70.42.32.127
91.228.74.203
91.228.74.223
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844
0765787f1966c35a86910225b871ca49249be9e882aade8899d624b431e7446b
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e
0adab74f1aeeead55075872b9c4b96f331601e619a739b294eb41dc369fb81b7
0b4cbad4c697d900c92b893c854d5c39ea7ff8bfcf9d9f057afe7a8f7e7c365d
0bd0bc4edd5e4b256b9c40ce082680ad16a78ac5faf4d3337d39cf9605518bfe
0ccda4be7dc38d5c80c7529c268f04837165d504c74cbd43d36b923bbce1b776
0e87b8c960a0cae7b83821deb6e3449cd2f136f600a9fedcfb7a2b6b7af8b37c
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
1177c743e7512f7343fdb3af7d2235e3afddb3e89cbbd173637645013aa56869
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8
174dec2e7da4b324c72c1d5fd1591832b170024d71fec278f94554452cea9f53
1980df33b126025d11b83a6c67c446c9b57069e427774569c0ef3b763978a090
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012
1da85050ab0b89d55be610c901b3ac65236f50f24cb85af475b7b10c096664e5
1ddadb0b7bd584bd85da731b073c56a1572399cf704081a12e95c701a0bbebf4
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8
24270887b28394cc0716af7ea1928f143c323120b1716ce547e31a77faa832c4
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5
28faefc7126edfb8b0ca9e210abece1cd7ba508b443b8e8d989693da82809265
2d85a6b3b59c317999df5240b27391ee600b8223c20754f1daac4ac92b50b496
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5
3305dfa037d68f51ed4a377638afe78bbef59da166e0cc53dd5ac73454a8c6db
3495e9f8299dc6ef6234bf69cea0e36741cf4613cd8e1d30763105546305999d
34c0194deac635fd02a300e11745a72d36b67bddefe58e02de53f5ffd2f70381
394932783730f35682dbdd0827ee70afd0e4208ac0316d8c9199ad9b49605b9d
3bf16831676488c9e6ea4aea8db26893534895101a1244c58afc1e47d713d298
3ce6aa359a1ab6d1a97a7ea066e6be363ba4a8bfbfa78896c7bc790a3db120f2
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c
3db171164331bd9c43ea9d4928b9b55c30192c7422207f8ec69c071db72fa9e5
3e6768dbb7e629c870d787433bf117b2108223e9c21e840a9610120a801fc906
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517
3fc112fac328b849983084948fad89e7473a5dce93c0db4b5aee9e8029a9e50b
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176
4146704de4673d5269e1e629f4ff6b6064439c9c97bf6633d6c840f57a64c4d5
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0
42a6e42dc806673c9656e5c221336100a2eed0f5dc61314397a43e9f0846e34c
42d43df9871bea8939c3f1e36ed01412eee4479bfb1c9b4a5b6b5a3f909e1749
44cc484716f02852830d571b04dcc3504e088e1eb8f0eed246e924706b2d69a3
4617e20d37a3950f6fb910a038f0427ce8735b373f4cdb4aeb1e98301f37c101
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd
4a64765dec5cd339627825bfc0dab7df162ec8de3588ce7273cda5bdfd414330
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b
4bcac5d2e8cbee50095e0d525d8e4f961ae10985689132f49af10b1541fcc983
4d2e73fabea4a24a0278320a4920a5766ae7c7c5a11f787e0f31467a253bdddf
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b
58e480745bfaaafb58ecda84bc32dfaf95233f75305bf085247f8447da7eb7cf
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c
5b54922ea8d9acf20475c8ea563bfb8874a5ca0246bbf12bbfdd92590afd5c7c
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba
5f760e6eaa1fd8e199a7135ae74692369612ff5de37b99eb63bcb8ee7d615568
614f8554f632195e9af6133784d6e43c57328e20f8804a877b84483e76450f11
61a9cccb8568b2da0166887f442732858229a4b471e487a3c5b7db5e18904f3d
61d6331496619d60a04b895636cc2db8fd1cf3f42d84721b8632f938648a0d71
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
6ab89bec5e1c974156258ab32dbe22e7d5dd61b65fe20d2fbae868787d79037c
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a
7088c852342dd777b2f6f1278d895932e6efd57ca5d3abca8886aced9ea43b9e
721e4d5d78c9b23b173494af66b09bebd4a7c2ad6a74364ef68a7066bcc5e2a5
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749
7289411038db973dd8d329755b2e154596b82f2c073a4abdf10585d5108e249e
729b870b03b792d6cb0eb8e340ce1800bf547297a2efd816f8ed5ca7dd7454b8
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3
736faf6f3dfd09658eb08862e67a475284c24cc5d4dced50be1c0772ba3c2b80
7709303f4e6b2e591cc3dacf550c8d0db8367b5d55e677077201d6a50c609b80
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207
7afde96ac85f0923ae9832e62f7766124fa69ae3c0e8b79d770aab99772b3980
7b9dadb6a3a9b8c3190390aa6e416db7747eca20803af8777c1d142bc61a6e03
7cc83d349167df6dfcadd320bacf9d8cfae78464ebacaefd6f8d99fe5a1adf62
7e42de22d78a240c6081763bcb888d939a6b92b94186df13c3e548ace3eea8a5
7ed658ce108ba9684ea3ba1d6c77f92ce23c36f3b46636a532e8cec2e647bbb1
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a
8899c2ad3ce92213431765a7253a292e9b0fab988d5b68bf8961a83137c6ae6b
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69
8e1b84265e633c043720dd0921476c16bc9f75e393e855c9116ca7c3a847b5c7
90a90c36f6b8bdedd42be70c52db109971ca006b57c32f055ef3a804b9d60a10
90df158bd8069cfcb14a1ef88ebaa95bdd86a4ab8cb31e5aa8f1597f403cbc01
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
9404cee30e4489a7ed4d6de2dd92aa8e4386fd5ff1c81ebcea77f581952eac31
9537f66a236619970123da504e1f6ed402f72880606351625ceb89712a48d3a4
95d95e4798fa8db6b11b9981a32e1257c8ed8afa80f58c0dd52b4623fa3012f9
986a0497ee1868674495c262db7f3718c7afbf8f062df9fdc721a1951894f11c
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab
9b1664c232b04784e459b6bcf3c576974066e0ca8420cc66b8c8be6484a52adc
9c512c11d7efe0ea9a959346a0850b19dbec72c21ac2c6373875b0dfd9f84f5f
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8
a1b235023f47ff6443e3d54b34363f41f20bc92cf6a72be3e42e9f12fe72ddf6
a4b1778a87595cf9ae9f5895ec53d8d0c7b14bcd2b8e83e97205de93d9e2d302
a4bdf4081ca145a3c47424f72b0a1378e0d06477afd4c34af2942706c1abcd29
a641143af073af304c2a59416f269a90f6c8520b63e60757b173a263efcf561a
a6a60bfeca1021496ac984a7e6b7f05f9473db17edcccbc91855b302863bab76
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
aece3989759ce8b9a715ba342a604316f14a06ff35d5d4ee0cb5c7dfc8bbecc6
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277
afeff1f2f0929ace50d45341a1a1ecb3b4a8012b6ea1f45a8e9fd0d46db1219e
b0817a0d6a87f2d42532035e42b20ea55cfaa5ca1092c761f5fc5e734790bdbf
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
b25c06e9419f4ecc6bd6b4cbb5bd4a01054e46e98d4b262df6e8c67ee271c3c0
b2f3d844adc76b37ce44edf6b2cce678df7e570921ec7c6a6f30ccf754903d5a
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b
b8062b50ce311ff9e5bd62ebc789741d28c6690bbe05550a7a6f286e92760201
c02e2b06d9126930b67bf7d73a9537dd60aa430a345a9e2773b645807ef0b4ec
c063623bde6fddcc704653915f8ffcdf11cb0da8304caccaf224f87e8ced84b1
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34
c1d3102c48c0a3b056ce43eb39b1c4043cffdd69ac8915efdf77d816c9227109
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2
c22caa33b00d16a07a2ce1edf9215e3fc7a061826be092ddefa9f93af011934d
c46974d8f6030e4888708b18a5d9a32b25eb765a5708896e1899df449d87aab7
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
c4b1dd4bb7210351cac5fd51aaf55a2220532739c042c15ae3667aa3d1198079
c52cb7e2518372600445005ba03da94e190cad0bc51fa569013903b9d165f4eb
c5f5f6694df995ebaa8c1ecb31388f2852474ee02f81d08da30fbed9aff7e1f6
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f
c8910a22831b152b7430b9f045c6aac9fbcdb3dc7e1844e523fe0971fe9f69c4
ca2a9c9b370cb90986b0dd715198e0b4445eea0ca984f520fb988d00b1de6976
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a
ccdae88a27f5cdd02c7c8e2525a1eeca05eb0a1cf0efd524379091a7ed2a6ede
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
d14b7ac07d9d07677f62a0f5c76ac8a49dc6577aabb40c11314ac779754dd464
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3
d31b12baad65082a7d404da9971cc9fed871e35f29a5893f815f468f1050491f
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701
d9742ea40c3b20a1db1cb838d11472c35ab5d8abe7cf2dc18797c43fbb392b99
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63
ded952a47a611855d9ff94963cc1377f804853ed9331aeb0a65a375c6663d9f0
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
dfaa95b975451ae0aeb18ad6aa73d954112c778b3bf76e219f2570f583c9e388
dfddb5a08bb174d7216b37cd929a894e3efe39a01636b620b1ad431a1f3d5ad1
e041a4e5c76336ae9f88d266db44495395da19c6a67f11ab6785510e001ec443
e0c557ff5196ab57117eab60d14541725b8ecec7ba4c7a4e298f7dce96efd410
e0f53b539638182ba270c81a18531d504acf0f2b94829b8c29266c5e29c7c060
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e450fb2896501f45461ff2aaf3a042b3df5f249b2b3afd759de0732ec95f7c39
e5a043fbf588b5d5f693f9b3fe70ee7839ce1eb442b7589dce855d4250f1a53e
e63b1da010fd0ae09966d8d1cb1d5a094faebea66a20c21b4f3e1c4c1abadd66
e90cb90ecb7926834f6fd4a59ac9c3f880857c1af02cccc7f85f9201410c69f0
e9a2a75eb86fdc28e7f2910fdc171d8bb554cd953d130e4998926019d8854b65
eb4b7ea3462af2f864d876a8f2b89589e28de75ac9849c1a6291417df878ba2a
eb557d116038c95e9dcb4a51e91041f0789ffb6e3449b8e28c85e0de957c0790
ebe634c19dfef5e534dff6b099490974d3c3637570a57fe464db9787c64e3f63
ec84902ae04cc118d965c577e2ece816abd594431ce66bcef1afd4f745e951fd
eecd392e02b113b0854fbc55131ee6a191280f3ad6bce7a0ca8abb7fccde3fb0
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
ef50fbb6411e721a4ac6d3c69079bee687d754e01216c093c7bdadd279e0b64a
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb
f118c1d52a40d5c65c4f7243b89f234f2e62ecbcd517f04d8159aa159acfbe1e
f123fae1ceff20dea7ee2ff8895276a22cddecc8e0ef503b5e95419e76909a54
f425f66d90f1150499b36ab47b56fa6fb1a68136e4f42befca20a920ff85306b
f513c914f8f3cf4975bf34937100375c4b4164ec77ec011488b643452f6ae22f
f5c2e7333aa9200c80ccad535e218065102ea75d86480ab96f2e82e5a884253c
f820f689e79fe927155372514936423b30eb400c1d2b87b6503d1398f6d352c7
f8800772f0dd827877029d9d634a170a156ff82b6b6bdf251b62c750b73cfe93
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf