Submitted URL: http://feeds.weblogssl.com/~r/genbeta/~3/UL4r1lP760M/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-w...
Effective URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickro...
Submission: On January 21 via manual from ES

Summary

This website contacted 49 IPs in 8 countries across 36 domains to perform 315 HTTP transactions. The main IP is 52.222.155.226, located in Seattle, United States and belongs to AMAZON-02, US. The main domain is www.genbeta.com.
TLS certificate: Issued by Amazon on January 16th 2020. Valid for: a year.
This is the only time www.genbeta.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2a00:1450:400... 15169 (GOOGLE)
3 52.222.155.226 16509 (AMAZON-02)
1 2600:9000:204... 16509 (AMAZON-02)
12 52.222.155.122 16509 (AMAZON-02)
32 2a00:1450:400... 15169 (GOOGLE)
7 27 23.45.99.242 20940 (AKAMAI-ASN1)
3 52.222.153.194 16509 (AMAZON-02)
16 52.222.155.24 16509 (AMAZON-02)
1 2 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 53 51.91.154.17 16276 (OVH)
7 2606:2800:234... 15133 (EDGECAST)
3 2a00:1450:400... 15169 (GOOGLE)
2 2600:9000:204... 16509 (AMAZON-02)
1 178.33.230.6 16276 (OVH)
2 2600:1901:0:7... 15169 (GOOGLE)
1 35 216.58.207.66 15169 (GOOGLE)
2 4 2a00:1450:400... 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2 2001:4860:480... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2 52.94.218.7 16509 (AMAZON-02)
3 2a03:2880:f02... 32934 (FACEBOOK)
1 192.0.77.2 2635 (AUTOMATTIC)
1 2 2a03:2880:f02... 32934 (FACEBOOK)
1 52.222.155.38 16509 (AMAZON-02)
4 52.222.155.67 16509 (AMAZON-02)
1 2a03:2880:f12... 32934 (FACEBOOK)
1 3 104.244.42.136 13414 (TWITTER)
1 2606:2800:134... 15133 (EDGECAST)
3 2606:2800:134... 15133 (EDGECAST)
17 2a00:1450:400... 15169 (GOOGLE)
15 94.130.242.230 24940 (HETZNER-AS)
5 159.69.76.252 24940 (HETZNER-AS)
1 92.222.198.105 16276 (OVH)
6 2a00:1450:400... 15169 (GOOGLE)
6 52.31.221.208 16509 (AMAZON-02)
2 2600:9000:204... 16509 (AMAZON-02)
2 2600:9000:204... 16509 (AMAZON-02)
3 185.94.180.123 35220 (SPOTX-AMS)
1 2a00:1450:400... 15169 (GOOGLE)
2 2.16.186.113 20940 (AKAMAI-ASN1)
2 185.86.137.43 201081 (SMARTADSE...)
2 185.28.138.9 197541 (VIDEOPLAZ...)
12 2a00:1450:400... 15169 (GOOGLE)
6 185.86.139.19 201081 (SMARTADSE...)
1 23.210.249.164 16625 (AKAMAI-AS)
1 185.33.223.215 29990 (ASN-APPNEX)
6 116.202.128.61 24940 (HETZNER-AS)
4 2a00:1450:400... 15169 (GOOGLE)
2 68.232.35.16 15133 (EDGECAST)
2 2600:9000:204... 16509 (AMAZON-02)
315 49
Apex Domain
Subdomains
Transfer
53 sunmedia.tv
platform.sunmedia.tv
static.sunmedia.tv
services.sunmedia.tv
track.sunmedia.tv
vast.sunmedia.tv
creatives.sunmedia.tv
477 KB
37 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
780 KB
32 richaudience.com
s.richaudience.com
sync.richaudience.com
t.richaudience.com
shb.richaudience.com
59 KB
27 scorecardresearch.com
sb.scorecardresearch.com
23 KB
22 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
3 KB
21 blogs.es
i.blogs.es
ti.blogs.es
ab.blogs.es
1 MB
15 googletagservices.com
www.googletagservices.com
399 KB
15 weblogssl.com
feeds.weblogssl.com
img.weblogssl.com
recommendations.weblogssl.com
417 KB
13 googleapis.com
fonts.googleapis.com
imasdk.googleapis.com
424 KB
13 google.com
adservice.google.com
www.google.com
2 KB
10 twitter.com
platform.twitter.com
syndication.twitter.com
107 KB
8 smartadserver.com
www8.smartadserver.com
prg.smartadserver.com
10 KB
6 google.be
adservice.google.be
2 KB
5 amazon-adsystem.com
c.amazon-adsystem.com
aax-eu.amazon-adsystem.com
30 KB
4 2mdn.net
s0.2mdn.net
42 KB
4 sascdn.com
ced.sascdn.com
ec.sascdn.com
40 KB
4 agkn.com
js.agkn.com
d.agkn.com
7 KB
4 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
40 KB
4 facebook.com
graph.facebook.com
staticxx.facebook.com
www.facebook.com
1 KB
4 google-analytics.com
www.google-analytics.com
18 KB
3 spotxchange.com
search.spotxchange.com
4 KB
3 google.de
adservice.google.de
www.google.de
389 B
3 youtube.com
img.youtube.com
41 KB
3 privacy-center.org
sdk.privacy-center.org
sdk-gcp.privacy-center.org
115 KB
3 genbeta.com
www.genbeta.com
132 KB
2 digitru.st
prebid.digitru.st
2 KB
2 videoplaza.tv
es-sunelespanol.videoplaza.tv
9 KB
2 gravatar.com
www.gravatar.com
3 KB
1 adnxs.com
ib.adnxs.com
1 KB
1 casalemedia.com
as-sec.casalemedia.com
988 B
1 richmediastudio.com
rosetta.richmediastudio.com
2 KB
1 fbsbx.com
platform-lookaside.fbsbx.com
1 KB
1 wp.com
i0.wp.com
627 B
1 facebook.net
connect.facebook.net
57 KB
1 adserver.video
adserver.video
243 B
0 rubiconproject.com Failed
fastlane.rubiconproject.com Failed
315 36
Domain Requested by
35 securepubads.g.doubleclick.net 1 redirects www.googletagservices.com
securepubads.g.doubleclick.net
www.genbeta.com
s.richaudience.com
27 sb.scorecardresearch.com 7 redirects www.genbeta.com
s.richaudience.com
20 static.sunmedia.tv www.genbeta.com
static.sunmedia.tv
www.googletagservices.com
creatives.sunmedia.tv
17 tpc.googlesyndication.com securepubads.g.doubleclick.net
static.sunmedia.tv
16 track.sunmedia.tv creatives.sunmedia.tv
static.sunmedia.tv
16 i.blogs.es www.genbeta.com
15 s.richaudience.com securepubads.g.doubleclick.net
s.richaudience.com
15 www.googletagservices.com www.genbeta.com
securepubads.g.doubleclick.net
12 imasdk.googleapis.com static.sunmedia.tv
imasdk.googleapis.com
12 img.weblogssl.com www.genbeta.com
www.google-analytics.com
securepubads.g.doubleclick.net
11 adservice.google.com www.googletagservices.com
securepubads.g.doubleclick.net
imasdk.googleapis.com
10 creatives.sunmedia.tv static.sunmedia.tv
creatives.sunmedia.tv
7 platform.twitter.com www.genbeta.com
platform.twitter.com
6 shb.richaudience.com www.genbeta.com
6 prg.smartadserver.com www.genbeta.com
6 t.richaudience.com www.genbeta.com
6 adservice.google.be securepubads.g.doubleclick.net
5 pagead2.googlesyndication.com
5 sync.richaudience.com s.richaudience.com
www.genbeta.com
sync.richaudience.com
4 s0.2mdn.net imasdk.googleapis.com
4 vast.sunmedia.tv static.sunmedia.tv
4 ab.blogs.es www.genbeta.com
4 www.google-analytics.com 2 redirects www.genbeta.com
3 search.spotxchange.com static.sunmedia.tv
3 pbs.twimg.com www.genbeta.com
3 syndication.twitter.com 1 redirects www.genbeta.com
3 img.youtube.com www.genbeta.com
3 c.amazon-adsystem.com www.genbeta.com
c.amazon-adsystem.com
3 www.genbeta.com www.genbeta.com
2 prebid.digitru.st creatives.sunmedia.tv
2 ec.sascdn.com creatives.sunmedia.tv
2 es-sunelespanol.videoplaza.tv static.sunmedia.tv
2 www8.smartadserver.com ced.sascdn.com
2 ced.sascdn.com creatives.sunmedia.tv
2 d.agkn.com js.agkn.com
2 js.agkn.com www.genbeta.com
2 services.sunmedia.tv static.sunmedia.tv
2 graph.facebook.com 1 redirects connect.facebook.net
2 aax-eu.amazon-adsystem.com 1 redirects c.amazon-adsystem.com
2 www.google.de www.genbeta.com
2 www.google.com 2 redirects
2 stats.g.doubleclick.net 2 redirects
2 sdk-gcp.privacy-center.org sdk.privacy-center.org
sdk-gcp.privacy-center.org
2 recommendations.weblogssl.com www.genbeta.com
2 www.gravatar.com 1 redirects www.genbeta.com
1 ib.adnxs.com www.genbeta.com
1 as-sec.casalemedia.com www.genbeta.com
1 fonts.googleapis.com
1 rosetta.richmediastudio.com s.richaudience.com
1 cdn.syndication.twimg.com platform.twitter.com
1 www.facebook.com connect.facebook.net
1 staticxx.facebook.com connect.facebook.net
1 ti.blogs.es www.genbeta.com
1 platform-lookaside.fbsbx.com www.genbeta.com
1 i0.wp.com www.genbeta.com
1 connect.facebook.net img.weblogssl.com
1 adservice.google.de www.googletagservices.com
1 adserver.video www.genbeta.com
1 platform.sunmedia.tv 1 redirects
1 sdk.privacy-center.org www.genbeta.com
1 feeds.weblogssl.com 1 redirects
0 fastlane.rubiconproject.com Failed www.genbeta.com
315 62
Subject Issuer Validity Valid
*.applesfera.com
Amazon
2020-01-16 -
2021-02-16
a year crt.sh
*.privacy-center.org
Amazon
2019-05-22 -
2020-06-22
a year crt.sh
merodeando.com
Amazon
2019-07-04 -
2020-08-04
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.scorecardresearch.com
Sectigo RSA Organization Validation Secure Server CA
2019-12-16 -
2020-12-25
a year crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
*.blogs.es
Amazon
2019-04-03 -
2020-05-03
a year crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.sunmedia.tv
COMODO RSA Domain Validation Secure Server CA
2018-01-19 -
2021-01-18
3 years crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.google.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
adserver.video
Let's Encrypt Authority X3
2018-11-29 -
2019-02-27
3 months crt.sh
sdk-gcp.privacy-center.org
Let's Encrypt Authority X3
2020-01-03 -
2020-04-02
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
www.google.de
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
aax-eu.amazon-adsystem.com
Amazon
2019-09-18 -
2020-08-26
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.richaudience.com
RapidSSL RSA CA 2018
2019-03-07 -
2021-04-05
2 years crt.sh
*.richmediastudio.com
RapidSSL RSA CA 2018
2018-04-04 -
2020-04-03
2 years crt.sh
*.google.be
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.agkn.com
RapidSSL RSA CA 2018
2018-06-21 -
2020-09-16
2 years crt.sh
*.spotxchange.com
GeoTrust RSA CA 2018
2019-03-18 -
2021-03-17
2 years crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.sascdn.com
DigiCert SHA2 Secure Server CA
2019-10-17 -
2020-10-16
a year crt.sh
*.smartadserver.com
Thawte RSA CA 2018
2018-09-07 -
2020-02-17
a year crt.sh
*.videoplaza.com
Let's Encrypt Authority X3
2019-11-27 -
2020-02-25
3 months crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.doubleclick.net
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
cdn-cf.digitru.st
Amazon
2019-05-21 -
2020-06-21
a year crt.sh

This page contains 46 frames:

Primary Page: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Frame ID: AE38830137CE39CEA2F9EBFE0B3630B0
Requests: 158 HTTP requests in this frame

Frame: https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Frame ID: 9C9A5F23FA92A694ED1948DBE3E53BB3
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html?origin=https%3A%2F%2Fwww.genbeta.com
Frame ID: 1360646A947ADDEECC9F02438756DA8C
Requests: 1 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter.php?version=45
Frame ID: 13F986C1582A736891A6DA997600505E
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: FAE87456A29AF6A819AD087C7BD7F1A9
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsurIL3a2FcCE7I89lN7kqLcs38rZuI-HqIAhjMfYypPxElsQeOoHxPHVq57fhaqhbqjIXxax0wEdSDu5goMAuopPj2VOBF1NgbrzrjTQH89wHMfoVCvey-77G6v3EeMFEkKklE0Bv_gocVxFCx4sRJ9d-3V_n98rou1VYF7JayejNUp2llZK2iwmDAeYdH-MkH1zJOA1BBbDC-pmp_EQc-P8uSJXPvCaEQOCNxaU9cWr9qoVzkjLHcmTQs-G_6bIykGy4z9vkKO01pgfA&sai=AMfl-YSzXCSVI6E6XFhKtkxI9xLb2VtUGjU7EL5ba1C71SkVwDVVGy12ZoxHUd6qbAcLNnkWo9Qte0eCbyeH1a0iLaiPxW9A9csrWBEzS8iH&sig=Cg0ArKJSzPxoHlz_g2UfEAE&urlfix=1&adurl=
Frame ID: CC637547F525C2FB3E48DA9C234B8AD6
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu7DM_T8UjyIl3Zla3OCco5ji5nZyVk8ocN9Z_WEFLuw3UK5nquQf8UjUIz_doBwxVL1k_IIG5gJe831vkIevZjHi5fj7PFT5JAZjJLgSsOuy3zhR7yP8hwg17iYskscf2Zn1rtKx3uvq_UIPOHj5JYEsKcDAmU1E9A7JI-fGza2TfKyUD4yHKy6LX1ZreTSxh6euhAw6c0QURflJl6hWh1i3ZXJTuM81pvzvvOALNtZSyb4IpOQw_pi11srPfrFUJHkB2SOlQ2FPp7og&sai=AMfl-YS0s411EIx7EyLS5lD2v0xJ06UwqvhzbJ4ooatjd5wLQbcNK0MD-z-A3ogntcPeoJiDWxra4nr4Mg3ovwdGrpMABlNumGQZyPy6AC0j&sig=Cg0ArKJSzDN_3LwHxDxLEAE&urlfix=1&adurl=
Frame ID: BC28FA4339BAC64C57147376B5566FC9
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssQd0W4HIclZDkLuBkEFoC10oH7ODwBWoB7EasjtVWTpl1NQYtMtrr--FKsNfB8z5oxvGUwwOssZk0lkDwDO5hO-WTnGfl8rVnBlCKDjtRp_Huoqge7Kina-IExGQkjDda3ypSjtmAuf0govYZD2s-rVY-IBUXWHCRjNx935y781cmp_0lWghJpfgP4rCEPUsG7cRlD34TmOJJ6HVhNqsIfRyO7HZWZwgoebwZfB6-Hn1GGudViHJatp9Mdv6yGL4rWEUNfdI54B3H8PQ&sai=AMfl-YSoc75mygrI_VUrxcbjcUE4_cXEmbDuz5Z9Rt1PxhHmfibdBXJzEdu3NCRCdmo9tOuQXuwsNj8GkzBMdkfJ785ICcEq7RjvrOQUAcn2&sig=Cg0ArKJSzNH7rOmaMrmLEAE&urlfix=1&adurl=
Frame ID: 6D6C8AF69526532657449F94BC3A43DE
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuToqZ4B2EbGUYa3vopiMPLILm9j09Bmdr8eT_7BjSo_SHaodcNkLLjlAStSeZ2AVU0uUusFscgvFbZUQUSxKBwMcbHHaqxaIrB1aff9EmOuXIHSU8I6xYZWkaNYVBxJkuAy9-4rk4vRUQYLTbUCfZzryqU9Q63-lJYAf9AQUUJA3Cdj_2OfdrOaX60Tg1RMhiG6xgtMsS8Wb5uBkXX8DXWKWzXYTmDpMYSPUfaRnpYo48HY-AgF1LzRtYcUFpJHY7P_gSO281OTevqeOw&sai=AMfl-YQLsdF_C3LI3SfMhU6z9RK1h7iWtCUiayG60wbARmyn0iaonQ5K9BE-2rrDhng6R1mSOpIUrMP66f0ueEqah-Kg9f7eKxtsjI32Yb3e&sig=Cg0ArKJSzB20eGWbykwHEAE&urlfix=1&adurl=
Frame ID: 1ECBA316D6A29F62264DA19797D93472
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsttuGG6SO3IJ_s5wQthpXveu4b9r-VmKGjyE8wsxR7u6-ytQBpujFuoJtVpQg3rRy1pBOCQhYck8MLvHvJDzj-H9tUc49LMOaJ3O8Rqst8s5DM3kk1TvlRYO5_cpeFlwhqhlE8a9PBpSPr2WMwiO0pinehD4IF5AEjzVVccL1F7F3qCRBxce-quVw-i6vss_4DqpQWe0xG6rVOXdlaCXMJ8wM4kbxvvuYgLa4is3Zogxn2nWEc88Ciekp_iVq95aAF-REnjqY3oDTsIww&sai=AMfl-YSQTTU_JbDgcSotjkFUgTzhJjeU5O8GdF_FeUXweoVUyt-ReiLI37NJKvuaFnI6cZW0V3WDYf9S-HfwLW-47d932XXEVLXD33-AE_RP&sig=Cg0ArKJSzDqW4GyBNt9hEAE&urlfix=1&adurl=
Frame ID: 8BAA98C71DC065999BE3CA60B9FD99AF
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvhYBxRc9qIX2jGpSahY1wP-JmYsExLsVQaZE5T92sDv4X9KkirkXZ9ZI-q0hmiCH0dBaHO0QD0AJgohCkD1y6XYV4R2x42_gWCi1fJZC2R_6s0iT8QeIQDhWRGUhaARaqwtPjsQK0xUaX2lmZy7FBoaVaYeLGw-33LQYI8fGYLsDRlalNM52MeuoCGZo3D2vcvN3aK7zxCJiqyrLEzllaDzz9S28Ghi7C2PwdOF-K4K09NhjqaIrFYeIPVCZFLIOl6hKafIvUdKYELvQ&sai=AMfl-YQoF4o529lGJuvNeNH3WmuLELlvXtLr9FbDf_BQ9Qy382-J_WQVpl54x2gzJnPOTKLZdGRB69RlpQp-AyYW28SPoqSa-O_lX98zgZN8&sig=Cg0ArKJSzFb30WZWUb1cEAE&urlfix=1&adurl=
Frame ID: 8DE440D99EC299D1170F15079DD1578D
Requests: 5 HTTP requests in this frame

Frame: data://truncated
Frame ID: 734F140D1C4C8FDA6F7E7E6726C99D28
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssQ3yQqJgih2EK0r-iQAINUBxauXiIdrVGiqHvVgGl8I8woOAfWO_dLH4NnNp5XiX4kLJQDPEdjnGgFllSv0DkVMDPIQ88Gbb38U3AaQa_h_drT_cKbhEABSOrbczVRHROAbJwQsASWcq9hJ2eU6J0Uh1tEb6UI1qo9VOp46OsuDbkvurKI9R0PlqVQc4Pvzopw_47kBUczuAvfaktYmPmZcHkuHnEA92ZO1gEJa9VMi1CktWlDjrVQwOAk0n9lErTej1qrBaOreyQ&sai=AMfl-YT8fo6ZXP3DEr3uHw3dh1tiwuy1oPc_cNlDD5PQUdezRL6cfIKRzYWDyGHRWmkOU40S5WuKJjUxHLEdv3PVgVHXfoj8rzWWNXgSLjis&sig=Cg0ArKJSzDNbT9qimSIlEAE&urlfix=1&adurl=
Frame ID: 1075281C29AC77443819AEE5EC2FC9FA
Requests: 4 HTTP requests in this frame

Frame: https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=3527055505005&pubconsent=&euconsent=&hasConsent=
Frame ID: F31F883FAC2A86A30DA5F8FAF0219A14
Requests: 1 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: 29AC7B750A90DF7925E26FEC5E2B239E
Requests: 12 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: 1532AE9D22D32BE5F6B6CE6FCD48EA90
Requests: 12 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: D10CD7E9EB99A9335A68E2EDC50BF08C
Requests: 12 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: 453486764EA01273823E41AD08B1120D
Requests: 12 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/0tqVvISHce/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: B7A644DADE27BAB7E5AEE06277B12E25
Requests: 12 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: 8E764D1541696F97730F6F68A3719C27
Requests: 12 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Frame ID: 4525F66605C06A5D6DEA546F45A17B0F
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Frame ID: 5A9EF6468B5C8CAB9DD8FFC30CC7DBC9
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Frame ID: 6C726706C58684EC35BCDE2BF9DA8191
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Frame ID: EFA08BD90EEDC7B4C8F929507627547E
Requests: 1 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=695687890&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Technolgy%20%26amp%3B%20Computer%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 245879A0CD8DFA78A966AF4FC6828D24
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Frame ID: A7F16E90790CFB9B73A1399B97EA76AA
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Frame ID: 9F7E72EFA512CC216D9DC1CAAF308EFD
Requests: 1 HTTP requests in this frame

Frame: https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=9327061&pubconsent=1&euconsent=1&hasConsent=1
Frame ID: E7322BFE588439C455C6C1BA24B77C5D
Requests: 1 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Frame ID: 1EBCBB9822E1CFCDAD913914C443576D
Requests: 3 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: C24A116E24D6C763AF59F449182EFAE0
Requests: 4 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=1568215&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Business%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 1CFEBCA63D55EB63F829FDB7F7DA08C7
Requests: 1 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Frame ID: C624A28C141129E8B1029986420E6349
Requests: 3 HTTP requests in this frame

Frame: https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=3892891&pubconsent=1&euconsent=1&hasConsent=1
Frame ID: EDE9A83FD9AC2998885B1BD687A46574
Requests: 1 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: C87A94C36CFB335161A8075527621196
Requests: 4 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: 266EAE4DA53CD6E9B5FADD529330A5BD
Requests: 6 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: 1AC4801683E8A844EBE29240F126BBAE
Requests: 6 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: 78A62AD4C1CB595DF974948708042272
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: 7CE22F608F2A8F89BAD7BAFFDCB47475
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: 1CD20E5CA66899BC77FF2F839C46337D
Requests: 6 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp&correlator=256633512
Frame ID: 5283BEA11EEE2DC716D95E22219AD6FF
Requests: 6 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: 95AF99217BD295AAAEBE0AE6BF958776
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: 5C9EE7639579F02B4D3EEB67FE3CC373
Requests: 1 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Frame ID: F638D568CDBD3811541FB3EE24ACFE23
Requests: 4 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Frame ID: 7E8908E7623A53C36FD7A1A17658929D
Requests: 3 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: C770FE76721674B5E614D2F7D48F732E
Requests: 5 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: E122E833FC91FAA781E0FE7DBAC5D5F1
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://feeds.weblogssl.com/~r/genbeta/~3/UL4r1lP760M/demuestran-como-puede-ser-explotada-grave-vulnerab... HTTP 301
    https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubier... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Page Statistics

315
Requests

98 %
HTTPS

49 %
IPv6

36
Domains

62
Subdomains

49
IPs

8
Countries

4425 kB
Transfer

12020 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://feeds.weblogssl.com/~r/genbeta/~3/UL4r1lP760M/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa HTTP 301
    https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 8
  • https://platform.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js HTTP 301
  • https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Request Chain 29
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035191&ns__t=1579615008596&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615008596&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 32
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=287850354&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&ul=en-us&de=UTF-8&dt=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=recommendationAmplify&ea=view&_u=aGDAAEABC~&jid=54176239&gjid=1203582365&cid=589673881.1579615009&tid=UA-78515-6&_gid=188289381.1579615009&_r=1&cg1=post&cg2=toni%20castillo&cg3=seguridad&cg4=normal&cg5=200116&cd3=Ads%20Blocked&z=222479677 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_gid=188289381.1579615009&gjid=1203582365&_v=j79&z=222479677 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_v=j79&z=222479677 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_v=j79&z=222479677&slf_rd=1&random=1150996087
Request Chain 37
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx HTTP 302
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Request Chain 41
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=287850354&t=pageview&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&ul=en-us&de=UTF-8&dt=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGDAAEABC~&jid=795589998&gjid=745168546&cid=589673881.1579615009&tid=UA-78515-62&_gid=188289381.1579615009&_r=1&cg1=post&cg2=toni%20castillo&cg3=seguridad&cg4=normal&cg5=200116&cd1=no&z=1492076933 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_gid=188289381.1579615009&gjid=745168546&_v=j79&z=1492076933 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_v=j79&z=1492076933 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_v=j79&z=1492076933&slf_rd=1&random=545798344
Request Chain 43
  • https://www.gravatar.com/avatar/c107b5d95e7878c0ae911c3e8cc302a3?default=https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg HTTP 302
  • https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
Request Chain 45
  • https://graph.facebook.com/402504386889031/picture HTTP 302
  • https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207008&hash=AeRuH8W8s4kfy4td
Request Chain 88
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 111
  • https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssmBVkxp9RsclEH64xpuRbBl_j-7oFMurJXmh3s-nEXfeXWdXx1xQxIqNQQ2ylFCxRh2_0IDc8a3dB6acnTIMzvM7d-FT4mmQlE6IOnPwdE_iNSK9rqhkZCgsmXMATDtThi157nMEHpWYJpi93k9Be6nGtNlCL70DK23327JwXZ7OLu3_MHXP-3XOHDZOFDZmfngo8f_-6yHb7R3Y2A8Mp2Pc8Ki-gUTXFE61dhLFFYvchP1kzD-uBxwhmAI7c5RfGHMP08PjjUwQ&sai=AMfl-YTSxFbi-n-uLopMlaa665t40ZmQ0NtlLCdpxEH4UBHSHLjy9l6KslmfwK2CXkpeAq5CvfwGds4pwMI460-8_NIjAgp2o6NZe5gMiBKp&sig=Cg0ArKJSzKCIsAbjlVnmEAE&urlfix=1&adurl=https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js HTTP 302
  • https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Request Chain 147
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011455&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011455&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 154
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011481&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011481&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 164
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011503&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011503&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 165
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011507&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011507&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 166
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011508&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011508&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 198
  • https://sb.scorecardresearch.com/p?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=911227457&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=3710082 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=911227457&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=3710082&cs_ak_ss=1

315 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa
www.genbeta.com/seguridad/
Redirect Chain
  • http://feeds.weblogssl.com/~r/genbeta/~3/UL4r1lP760M/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa
  • https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Fe...
116 KB
29 KB
Document
General
Full URL
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.226 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-226.fra53.r.cloudfront.net
Software
/
Resource Hash
5cc2b7502d674e031f2d123adcac470ed49f094ed3b41f946f6e035255a19cfe

Request headers

:method
GET
:authority
www.genbeta.com
:scheme
https
:path
/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
content-type
text/html; charset=UTF-8
date
Tue, 21 Jan 2020 13:56:47 GMT
cache-control
no-cache, private
surrogate-control
content="ESI/1.0"
vary
Accept-Encoding
content-encoding
gzip
x-clientip
82.102.19.132
countrycode
BE
accept-ranges
bytes
x-cache
Miss from cloudfront
via
1.1 c483a0db2609b3ac0bb94a739fe72cc7.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-amz-cf-id
i3TizqBCVIZXfCNk_yXIUN1uQcyjUjNDxCtUKJlB4xOBB3uWrKlJNA==

Redirect headers

Location
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Content-Type
text/html; charset=UTF-8
Content-Encoding
gzip
Date
Tue, 21 Jan 2020 13:56:47 GMT
Expires
Tue, 21 Jan 2020 13:56:47 GMT
Cache-Control
private, max-age=0
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Length
312
Server
GSE
prebidGdpr.js
www.genbeta.com/js/
223 KB
71 KB
Script
General
Full URL
https://www.genbeta.com/js/prebidGdpr.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.226 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-226.fra53.r.cloudfront.net
Software
/
Resource Hash
865b8747d5495fe4cf1616e5d51c0bc0e8aa84b09be4c3ed32fcdd660d66d418

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:47 GMT
content-encoding
gzip
x-amz-cf-pop
FRA53
x-cache
Miss from cloudfront
status
200
x-clientip
82.102.19.132
countrycode
BE
content-length
72503
last-modified
Thu, 16 Jan 2020 08:04:43 GMT
etag
W/"37a95-59c3d47143cc0-gzip"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 c483a0db2609b3ac0bb94a739fe72cc7.cloudfront.net (CloudFront)
accept-ranges
bytes
x-amz-cf-id
aHYR6sXbgVHEcIa0LehCMftr_-YKt8cSUEQQq0WPsXGD43ZZTnJMEg==
x-cache-hits
25
loader.js
sdk.privacy-center.org/
1 KB
982 B
Script
General
Full URL
https://sdk.privacy-center.org/loader.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:6600:5:b7cc:d3c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
b7ddf507054b7206085b506cf46b07c083556e1e3cae297891d37923069392a0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:25:26 GMT
content-encoding
gzip
server
CloudFront
age
1912
etag
"b64959320b762beda5edf8257dfc57f4"
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
status
200
cache-control
public, max-age=3600
x-amz-cf-pop
FRA53
content-length
654
via
1.1 44d7d28132a47c2b5760c4ec3dd7aa89.cloudfront.net (CloudFront)
x-amz-cf-id
KLxRiJdut3jLMvqOxLmmgiMuUsCkY74QyRA-Zs-ELG8ogpPrzhcAMg==
main.css
img.weblogssl.com/css/genbeta/p/skin-site-default-d/
1 MB
132 KB
Stylesheet
General
Full URL
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
40dddfe034b75029b6fd12c496194da0aff7fb59bf33a72fcf3d8f157fc47a15

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:48 GMT
content-encoding
gzip
last-modified
Fri, 27 Dec 2019 09:43:21 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
text/css
status
200
cache-control
max-age=30000000
x-amz-cf-id
2pGj2wfaY33UhIz08neb8dvTG8WWcCoM_enFxo-4jRmiK2nYxB6SvA==
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
gpt.js
www.googletagservices.com/tag/js/
52 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ae00b320e8479277bf802702335f10321b2e481f582b2b59f282b9ff33dfdc5a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 714 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16139
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:47 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:47 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:47 GMT
apstag.js
c.amazon-adsystem.com/aax2/
87 KB
25 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.194 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-194.fra53.r.cloudfront.net
Software
Server /
Resource Hash
3e6bd7935ed1c5dd439ec5688cf79b71fd5a2626ec5a0a35114664d32d2d5b48

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 20 Jan 2020 17:28:55 GMT
content-encoding
gzip
server
Server
age
73672
etag
35a83f4a8c9edf67149dc12b212a54c9
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA53
accept-ranges
bytes
x-amz-cf-id
2fK7Gx1IZGkrXZRALp7a4CmrX-A0DWcR_uMDyxpniHLmjbruj8HhhA==
via
1.1 91db3e27f70759a0dea967c4b34efea9.cloudfront.net (CloudFront)
1366_2000.jpg
i.blogs.es/344052/anotacion-2020-01-16-155848/
95 KB
95 KB
Image
General
Full URL
https://i.blogs.es/344052/anotacion-2020-01-16-155848/1366_2000.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3b83b8eda9b0d6096786fdec2357d916bdd1e06f8e8745fa57d79ac8615ab1d0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Thu, 16 Jan 2020 15:30:42 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"d6ef5abe3d195f74182b8ec5b5a1d91f"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
96992
x-amz-cf-id
HPNOi-p6ml4P5dpLeeYMC-NdDSz-VKmvwYWax-QbKqyiJnN7hFrDuw==
ff329d574153a568ed655b21d630d8ab
www.gravatar.com/avatar/
2 KB
3 KB
Image
General
Full URL
https://www.gravatar.com/avatar/ff329d574153a568ed655b21d630d8ab?s=80&d=mm&r=g
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
c860bc9b319a421b24a4322ba7c5a6d36beecfd0fa884563040da57d793fb4d9

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-nc
HIT fra 2, BYPASS fra 1
date
Tue, 21 Jan 2020 13:56:47 GMT
last-modified
Mon, 17 Apr 2017 20:45:38 GMT
server
nginx
access-control-allow-origin
*
source-age
1841454
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="ff329d574153a568ed655b21d630d8ab.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/ff329d574153a568ed655b21d630d8ab?s=80&d=mm&r=g>; rel="canonical"
content-length
2478
expires
Tue, 21 Jan 2020 14:01:47 GMT
94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/
Redirect Chain
  • https://platform.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
  • https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
176 KB
47 KB
Script
General
Full URL
https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
fa795a51e041bc779cc1f46677354e2358567a1e2a4b6c50d3493e4f8d718627

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:48 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 19:25:49 GMT
server
nginx
age
498655
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592001
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
48048

Redirect headers

date
Tue, 21 Jan 2020 13:56:48 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
335019
location
https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
text/html; charset=UTF-8
status
301
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
vary
Accept-Encoding
content-length
243
widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
4dced00354b099d831f860145bbd0149f99889d4c45632e4d9e849f008123866

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:48 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:50:12 GMT
Server
ECS (fcn/419E)
Age
860
Etag
"09356930f7674f04e767f5b1203faeb7+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Cache-Control
public, max-age=1800, stale-while-revalidate=30
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
28838
375_142.jpg
i.blogs.es/267e3b/iphone-x-3706545_1920/
11 KB
12 KB
Image
General
Full URL
https://i.blogs.es/267e3b/iphone-x-3706545_1920/375_142.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
167f7548988de7748099138bb9a6692cc3ccf1b0807b0244c64a7bcbff9ee8dd

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Mon, 13 Jan 2020 15:21:35 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"9975466d685a236d05e2e3239f1c434c"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
11614
x-amz-cf-id
fks5DD9aVh2Cdy475RxbIknr5zLh0vhms_xXRqYWj5iyIMgWHErbXg==
mqdefault.jpg
img.youtube.com/vi/WuFr-XRIDb4/
13 KB
14 KB
Image
General
Full URL
https://img.youtube.com/vi/WuFr-XRIDb4/mqdefault.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d558c1334627402db5608947786ac8791b88c098d0318b9cbdc03657dd41b1ac
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:50:50 GMT
x-content-type-options
nosniff
server
sffe
age
358
etag
"1579013622"
content-type
image/jpeg
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
13498
x-xss-protection
0
expires
Tue, 21 Jan 2020 15:50:50 GMT
mqdefault.jpg
img.youtube.com/vi/x6ke5rgwkR8/
12 KB
12 KB
Image
General
Full URL
https://img.youtube.com/vi/x6ke5rgwkR8/mqdefault.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
82d1d88540b664a8970417f0d3431fcd0bd57f788a95a48658730538245c5c93
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:54:56 GMT
x-content-type-options
nosniff
server
sffe
age
112
etag
"1577122649"
content-type
image/jpeg
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
12636
x-xss-protection
0
expires
Tue, 21 Jan 2020 15:54:56 GMT
mqdefault.jpg
img.youtube.com/vi/wBgD1THVuZ8/
15 KB
15 KB
Image
General
Full URL
https://img.youtube.com/vi/wBgD1THVuZ8/mqdefault.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2d6b715ef20845c2731dc09374196e0c01c2f98c34475d37e2095451f665ce4b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:35:29 GMT
x-content-type-options
nosniff
server
sffe
age
1279
etag
"1576513755"
content-type
image/jpeg
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15376
x-xss-protection
0
expires
Tue, 21 Jan 2020 15:35:29 GMT
jwplayer.js
www.genbeta.com/jwplayer/
99 KB
32 KB
Script
General
Full URL
https://www.genbeta.com/jwplayer/jwplayer.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.226 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-226.fra53.r.cloudfront.net
Software
/
Resource Hash
1e7ba5371773a7836d7bf94a91a1ab386f10786ce97c039cf83d2adbdaf34cef

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:47 GMT
content-encoding
gzip
x-amz-cf-pop
FRA53
x-cache
Miss from cloudfront
status
200
x-clientip
82.102.19.132
countrycode
BE
content-length
32538
last-modified
Thu, 16 Jan 2020 08:04:43 GMT
etag
W/"18ca8-59c3d47143cc0-gzip"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 c483a0db2609b3ac0bb94a739fe72cc7.cloudfront.net (CloudFront)
accept-ranges
bytes
x-amz-cf-id
tp_XdSWs3AMLSEp-ZHi3bTSzG8GJOrVNF78o1MCsXeOwfRIWxOtYQg==
x-cache-hits
17
postpage-cdeb2da9.js
img.weblogssl.com/LPbackend/prod/v2/js/
874 KB
233 KB
Script
General
Full URL
https://img.weblogssl.com/LPbackend/prod/v2/js/postpage-cdeb2da9.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
79afcf8f4da54ebf108e0a255d15bbd3316ed24b8ed3de3c7c8e0dd2c3f41e21

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
last-modified
Thu, 16 Jan 2020 08:04:36 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
c3r21v6u3_7rsVjSzqtUGid2c3u1rayu_ze0AYksP8ICuddvyZb2XA==
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
common-modules-cdeb2da9.js
img.weblogssl.com/LPbackend/prod/v2/js/
33 KB
11 KB
Script
General
Full URL
https://img.weblogssl.com/LPbackend/prod/v2/js/common-modules-cdeb2da9.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
71caaaca33d06f8fa9966d8fcd7d8b3fc63c38925d2e52c4a646706a28930812

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
last-modified
Thu, 16 Jan 2020 08:04:33 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
WTbj8_ufp3Kx8LECaOTmffOmwRiLa4P0ZWt5TQrAukZEdvDlDs_M9Q==
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
script
recommendations.weblogssl.com/genbeta/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa/BE/
21 KB
4 KB
Script
General
Full URL
https://recommendations.weblogssl.com/genbeta/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa/BE/script?category=seguridad&picture_tag=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:3a00:16:9f91:2d80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Express
Resource Hash
cfde6f099a0d26d953c2da2a17c9d51064dc02e7190a5827112927b8d1f7249a

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:48 GMT
content-encoding
gzip
x-amz-cf-pop
FRA53
x-powered-by
Express
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
application/javascript; charset=utf-8
status
200
access-control-allow-origin
*
x-amz-cf-id
TEyljYFCtOY2OxVYs_e0RtS85iIvrN4Nnu9-wOn6VW0lceDIHMm4iQ==
via
1.1 c0486ca54d4ad5a3da496bc2b5f49cd2.cloudfront.net (CloudFront)
script
recommendations.weblogssl.com/editorial/genbeta/
7 KB
2 KB
Script
General
Full URL
https://recommendations.weblogssl.com/editorial/genbeta/script?picture_tag=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:3a00:16:9f91:2d80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Express
Resource Hash
3a02c7c42a3d53c628d411e2a7e2e05736f4a9eca24a2e6191e20cbb7412c96e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:46:39 GMT
content-encoding
gzip
age
609
x-powered-by
Express
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
status
200
x-amz-cf-pop
FRA53
access-control-allow-origin
*
x-amz-cf-id
oqR48ojnCVnGLjy3mTwVygvOSp-xRgnkLvflEe5x4WYPGLq2HKZDvg==
via
1.1 c0486ca54d4ad5a3da496bc2b5f49cd2.cloudfront.net (CloudFront)
/
adserver.video/serve/wbl/
0
243 B
Script
General
Full URL
https://adserver.video/serve/wbl/?raiSite=gb&ord=1579615007
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
178.33.230.6 , France, ASN16276 (OVH, FR),
Reverse DNS
cm002.richaudience.com
Software
nginx/1.10.3 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:47 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Server
nginx/1.10.3
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
sdk.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
sdk-gcp.privacy-center.org/
309 KB
76 KB
Script
General
Full URL
https://sdk-gcp.privacy-center.org/sdk.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
Requested by
Host: sdk.privacy-center.org
URL: https://sdk.privacy-center.org/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:7dde:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
UploadServer /
Resource Hash
fb3204628c9947d9a28fd6adf9477ea77c0e6963512e1b8115ced5f381fb13a4

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Fri, 17 Jan 2020 16:24:41 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1579277317
age
336727
status
200
x-guploader-uploadid
AEnB2UqlhGlE7s-x6VgEKLbIjOm5V73yezdku-R9W3biLxeRPtYYK1JpD7-05PdJl85XopIA21FKnixhmK-uVTMaOYvRSoVPRQ
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
2
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
77329
last-modified
Fri, 17 Jan 2020 16:23:57 GMT
server
UploadServer
etag
"65b24a8d32b6177452b0ed156801da13"
vary
Accept-Encoding
x-goog-hash
crc32c=vqKdMQ==, md5=ZbJKjTK2F3RSsO0VaAHaEw==
x-goog-generation
1579278237915990
cache-control
public, max-age=31536000
x-goog-stored-content-length
77329
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
expires
Sat, 16 Jan 2021 16:24:41 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:48 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.194 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-194.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Mon, 20 Jan 2020 14:05:50 GMT
content-encoding
gzip
vary
Origin
age
85859
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Wed, 08 Jan 2020 04:09:03 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 67284fcf464f6f1529cc1e521669622c.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA53
x-amz-cf-id
9kvwKPgRYE_MVs4-yi6xuq_UAka4gGWswdl1Quq6UZkNJupSNo3UrQ==
bid
c.amazon-adsystem.com/e/dtb/
116 B
498 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3500&u=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&pid=M7OfoE0s0ur6l&cb=0&ws=1600x1200&v=7.45.01&t=3000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-TOP-interior%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22160x600%22%2C%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-LAT-interior%22%7D%2C%7B%22sd%22%3A%222%22%2C%22s%22%3A%5B%22160x600%22%2C%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-LAT2-interior%22%7D%2C%7B%22sd%22%3A%223%22%2C%22s%22%3A%5B%22300x250%22%2C%22728x90%22%2C%22970x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-CEN-interior%22%7D%2C%7B%22sd%22%3A%224%22%2C%22s%22%3A%5B%22300x250%22%2C%22728x90%22%2C%22970x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-CEN2-interior%22%7D%2C%7B%22sd%22%3A%225%22%2C%22s%22%3A%5B%22300x250%22%2C%22728x90%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-BOT2-interior%22%7D%5D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.194 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-194.fra53.r.cloudfront.net
Software
Server /
Resource Hash
75bfc8af082050cd05bad66f4c5135ff7d3717b9bab80f53a03046ef8a0ac20e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:48 GMT
content-encoding
gzip
server
Server
x-amz-cf-pop
FRA53
status
200
vary
Accept-Encoding,User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
124
via
1.1 91db3e27f70759a0dea967c4b34efea9.cloudfront.net (CloudFront)
x-amz-cf-id
gIr_Ocmt8wBfPhXiwX7TojqWzKYw_6_u3rE-XvNm-PMSsM32Wz6u8A==
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
1113
date
Tue, 21 Jan 2020 13:38:15 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Tue, 21 Jan 2020 15:38:15 GMT
head-brand-logo.svg
img.weblogssl.com/css/genbeta/p/skin-site-default-d/images/
8 KB
4 KB
Image
General
Full URL
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/images/head-brand-logo.svg?v=129
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
b07ae2953d8bd79f884eaf056987bd50dc9b8729f701a693d0511020f2f02fcf

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:44 GMT
content-encoding
gzip
last-modified
Tue, 13 Mar 2018 15:58:46 GMT
server
AmazonS3
age
18785
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
cache-control
max-age=30000000
x-amz-cf-pop
FRA53
x-amz-cf-id
Plyv7jnkV8T7L6Li4Ry80mXpgh4B81jVNjnw5moGJxM9h34kDv5eIg==
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
icons.ttf
img.weblogssl.com/g/r/icons/
15 KB
10 KB
Font
General
Full URL
https://img.weblogssl.com/g/r/icons/icons.ttf?bv10vh6
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d8fce0ac98e2953582074d8a56b540d7f599161bf44dca85c7dd7458ce2198bd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 08:31:29 GMT
content-encoding
gzip
last-modified
Mon, 21 Oct 2019 10:22:35 GMT
server
AmazonS3
age
19520
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
access-control-allow-methods
GET, PUT, HEAD
content-type
application/font-sfnt
status
200
access-control-max-age
3000
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA53
access-control-allow-origin
*
x-amz-cf-id
RqVA7HuG_8LV9WgZbprLP_px3wS3PK-maWAFqSoK6bEr4VVsm7jBBQ==
via
1.1 e1f6fa82d37f125cb361c7c37faf6662.cloudfront.net (CloudFront)
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035191&ns__t=1579615008596&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Wind...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615008596&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Win...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615008596&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:48 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615008596&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:48 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
icon-fire.png
img.weblogssl.com/g/r/svg/
1008 B
1 KB
Image
General
Full URL
https://img.weblogssl.com/g/r/svg/icon-fire.png?v=129
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9ab17e8bc3643997f26bbef40677b44acd0e71d10c2663a26f8326b7c095ac9e

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:44 GMT
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
last-modified
Tue, 02 Jul 2019 10:42:23 GMT
server
AmazonS3
age
18784
etag
"dffaeb59a843985a8200769ac04b442d"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
1008
x-amz-cf-id
KsOo6r6kSUTMafvBCRB3QnGeW1mGxiUD7tW8OyKqMiFP4dX1IF9t2A==
social-email.svg
img.weblogssl.com/g/r/svg/
970 B
1 KB
Image
General
Full URL
https://img.weblogssl.com/g/r/svg/social-email.svg?v=129
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
526c2c5dc827525752c2e918fa14dbba227db1ffacd4c8dd4d521154a25f08ba

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:45 GMT
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
last-modified
Tue, 04 Jun 2019 07:49:54 GMT
server
AmazonS3
age
18784
etag
"7ee9baaa63509512a14308b764a760ee"
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
970
x-amz-cf-id
0cVHLYU5ziWYs75dJfi2PQiiL96SkoOZnLNOnHYYU0YFaZ1TQrasdA==
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=287850354&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubier...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_gid=188289381.1579615009&gjid=1203582365&_v=j79&z=222479677
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_v=j79&z=222479677
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_v=j79&z=222479677&slf_rd=1&random=1150996087
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_v=j79&z=222479677&slf_rd=1&random=1150996087
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:48 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:48 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=589673881.1579615009&jid=54176239&_v=j79&z=222479677&slf_rd=1&random=1150996087
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ui-gdpr-es.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
sdk-gcp.privacy-center.org/
177 KB
38 KB
Script
General
Full URL
https://sdk-gcp.privacy-center.org/ui-gdpr-es.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
Requested by
Host: sdk-gcp.privacy-center.org
URL: https://sdk-gcp.privacy-center.org/sdk.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:7dde:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
UploadServer /
Resource Hash
edc9dc0d41064a3aee8877727c4a265bfcfb2f6da4aba0e10232b7fb3578a4a5

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Fri, 17 Jan 2020 16:24:52 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1579277317
age
336716
status
200
x-guploader-uploadid
AEnB2UqZS5SLOeaXJU7ItQXi8rWTivUnVyifS19h_ywMJTvur0s0sI-jxWIEWRI7xibp7WNbZmu5nk9h3D-hKt354KBMXf2-GA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
2
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
38506
last-modified
Fri, 17 Jan 2020 16:23:58 GMT
server
UploadServer
etag
"bad4f290cf4ef5f5157aa49f95096719"
vary
Accept-Encoding
x-goog-hash
crc32c=tyyFnQ==, md5=utTykM9O9fUVeqSflQlnGQ==
x-goog-generation
1579278238086526
cache-control
public, max-age=31536000
x-goog-stored-content-length
38506
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
expires
Sat, 16 Jan 2021 16:24:52 GMT
webedia-default.svg
img.weblogssl.com/g/r/svg/webedia/
8 KB
4 KB
Image
General
Full URL
https://img.weblogssl.com/g/r/svg/webedia/webedia-default.svg?v=129
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a7c524af142ac2b99d4f9bf37fe7bdc13abcb6eef227c8ff299448513f13a7c5

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:45 GMT
content-encoding
gzip
last-modified
Tue, 04 Jun 2019 07:49:54 GMT
server
AmazonS3
age
18784
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
x-amz-cf-pop
FRA53
x-amz-cf-id
OPu4U79VPkmgUfvc1EttgoqHRt84a-Nh6nIdyC_bDhMVqlaBNNaYOg==
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
logo-light.svg
img.weblogssl.com/css/xataka/p/r/images/
3 KB
2 KB
Image
General
Full URL
https://img.weblogssl.com/css/xataka/p/r/images/logo-light.svg?v=129
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3d1b40a4df9ccc5fda3c6e8724e2464ac6c20896af9c9d0d3b70727d96a5a610

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:45 GMT
content-encoding
gzip
last-modified
Tue, 13 Mar 2018 15:29:21 GMT
server
AmazonS3
age
18784
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
cache-control
max-age=30000000
x-amz-cf-pop
FRA53
x-amz-cf-id
ZI60uzRHQs7nDbdp0UJLBLylJXOLTV7c5wfxAKQaQqxs1uKknHBs1Q==
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
favicons.ttf
img.weblogssl.com/g/r/icons/
13 KB
10 KB
Font
General
Full URL
https://img.weblogssl.com/g/r/icons/favicons.ttf?n1rtsy
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
df7f859834554abb56ef81c305e90496ef00133badd6c088321577e116418619

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 08:31:29 GMT
content-encoding
gzip
last-modified
Wed, 18 Sep 2019 06:10:15 GMT
server
AmazonS3
age
19520
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
access-control-allow-methods
GET, PUT, HEAD
content-type
application/font-sfnt
status
200
access-control-max-age
3000
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA53
access-control-allow-origin
*
x-amz-cf-id
LL3ZpEuZKHNHcEbv1BGsP6kdE7tri_yRXTr9zqqqPNRW8gEErsGdlw==
via
1.1 e1f6fa82d37f125cb361c7c37faf6662.cloudfront.net (CloudFront)
Cookie set iu3
aax-eu.amazon-adsystem.com/s/ Frame 9C9A
Redirect Chain
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
0
0
Document
General
Full URL
https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.218.7 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash

Request headers

Host
aax-eu.amazon-adsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Cookie
ad-id=A_z4MIsM70EEgCoHTp3uxBg|t
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Server
Server
Date
Tue, 21 Jan 2020 13:56:49 GMT
Content-Type
text/html;charset=ISO-8859-1
Content-Length
192
Connection
keep-alive
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma
no-cache
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Set-Cookie
ad-id=A_z4MIsM70EEgCoHTp3uxBg; Domain=.amazon-adsystem.com; Expires=Thu, 01-Oct-2020 13:56:48 GMT; Path=/; Secure; HttpOnly; SameSite=None ad-privacy=0; Domain=.amazon-adsystem.com; Expires=Tue, 01-Apr-2025 13:56:49 GMT; Path=/; Secure; HttpOnly; SameSite=None
Vary
Accept-Encoding,User-Agent
Content-Encoding
gzip

Redirect headers

Server
Server
Date
Tue, 21 Jan 2020 13:56:48 GMT
Content-Length
0
Connection
keep-alive
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma
no-cache
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Location
https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Set-Cookie
ad-id=A_z4MIsM70EEgCoHTp3uxBg|t; Domain=.amazon-adsystem.com; Expires=Thu, 01-Oct-2020 13:56:48 GMT; Path=/; Secure; HttpOnly; SameSite=None
Vary
User-Agent
widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html
platform.twitter.com/widgets/ Frame 1360
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html?origin=https%3A%2F%2Fwww.genbeta.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
1004686
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
Content-Type
text/html; charset=utf-8
Date
Tue, 21 Jan 2020 13:56:48 GMT
Etag
"4b563298f37eb3ef2a2f8897be83c714+gzip"
Last-Modified
Thu, 09 Jan 2020 22:38:16 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/419E)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
all.js
connect.facebook.net/es_ES/
190 KB
57 KB
Script
General
Full URL
https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Requested by
Host: img.weblogssl.com
URL: https://img.weblogssl.com/LPbackend/prod/v2/js/postpage-cdeb2da9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e501b55feccffb84458adf8f65df7a29f6f31c6a8ab7d3e3bed678c5b60e69ea
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
+ezGwQKfWUYWoRb7b6sMvQ==
status
200
date
Tue, 21 Jan 2020 13:56:48 GMT, Tue, 21 Jan 2020 13:56:48 GMT
expires
Sat, 16 Jan 2021 08:49:05 GMT
alt-svc
h3-24=":443"; ma=3600
content-length
57715
x-fb-debug
jkagj3dsaZeOkuHZ+93sWhl4tjVOY1SI29l3aDO+40ubr80HGsMrjeYtt/IvuEfVP0b7w8OIt9CGGYe3xUt5PA==
x-fb-trip-id
1850256238
x-fb-content-md5
f2960c93c6992521837ec5921052912c
etag
"2fe5105139daf0046443e767eb7b08aa"
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
collect
www.google-analytics.com/
35 B
102 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=287850354&t=pageview&_s=2&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&ul=en-us&de=UTF-8&dt=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGDAAEABC~&jid=&gjid=&cid=589673881.1579615009&tid=UA-78515-6&_gid=188289381.1579615009&cg1=post&cg2=toni%20castillo&cg3=seguridad&cg4=normal&cg5=200116&cd3=Ads%20Blocked&cd1=no&z=583109997
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Jan 2020 13:44:27 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
346341
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=287850354&t=pageview&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_gid=188289381.1579615009&gjid=745168546&_v=j79&z=1492076933
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_v=j79&z=1492076933
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_v=j79&z=1492076933&slf_rd=1&random=545798344
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_v=j79&z=1492076933&slf_rd=1&random=545798344
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:49 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:49 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=589673881.1579615009&jid=795589998&_v=j79&z=1492076933&slf_rd=1&random=545798344
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
avatar.png
img.weblogssl.com/css/genbeta/p/v7/images/
609 B
947 B
Image
General
Full URL
https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a8b91381e4d8b2ae1f62fe9a02985dad6e77e23be53c041762dd5e2ea6d417fc

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
last-modified
Tue, 13 Mar 2018 13:36:57 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"feb5cda1d174bf035720cf094d428d76"
x-cache
Miss from cloudfront
content-type
image/png
status
200
cache-control
max-age=30000000
accept-ranges
bytes
content-length
609
x-amz-cf-id
jOOMnABmzeDNn8QpOvNFvFEfSDncXbV2RMotVhnopV3pytDMjsqRCw==
avatar.jpg
i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/
Redirect Chain
  • https://www.gravatar.com/avatar/c107b5d95e7878c0ae911c3e8cc302a3?default=https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg
  • https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
356 B
627 B
Image
General
Full URL
https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
b64c9f0e95e4baf25a13cf189ada24c9befbb4d9743f8085af11ffc131627c58
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-nc
HIT ams 3
date
Tue, 21 Jan 2020 13:56:49 GMT
x-content-type-options
nosniff
x-bytes-saved
408
last-modified
Mon, 04 Feb 2019 07:15:08 GMT
server
nginx
etag
"5b056abee383b575"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg>; rel="canonical"
content-length
356
expires
Wed, 03 Feb 2021 19:15:08 GMT

Redirect headers

x-nc
HIT fra 3, MISS fra 1
date
Tue, 21 Jan 2020 13:56:48 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
source-age
1316955
location
https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
content-type
text/html; charset=utf-8
status
302
cache-control
max-age=300
link
<https://www.gravatar.com/avatar/c107b5d95e7878c0ae911c3e8cc302a3?default=https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg>; rel="canonical"
content-length
0
expires
Tue, 21 Jan 2020 14:01:48 GMT
709548_1.png
img.weblogssl.com/avatar/mini/
3 KB
3 KB
Image
General
Full URL
https://img.weblogssl.com/avatar/mini/709548_1.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.122 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-122.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ca3e485bd6ba07030ec71a5f83806a6669e08324fcf9bc949a4e30e285fabd29

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-cache
Miss from cloudfront
status
200
x-amz-meta-mode
33188
content-length
2567
last-modified
Fri, 10 May 2013 17:31:18 GMT
server
AmazonS3
etag
"95bdc7c2e1c8d799087b8f5199d400e2"
x-amz-meta-uid
0
x-amz-meta-gid
0
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
fxnIbhiBG3faVkBgp_MgoQFgzf8buZRF5llnc31IIeUQWMAlplly-g==
x-amz-meta-mtime
1368207077
/
platform-lookaside.fbsbx.com/platform/profilepic/
Redirect Chain
  • https://graph.facebook.com/402504386889031/picture
  • https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207008&hash=AeRuH8W8s4kfy4td
1014 B
1 KB
Image
General
Full URL
https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207008&hash=AeRuH8W8s4kfy4td
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
8f54940ad996a668b7f2d7a4dc8dacc67b7345cfcb9dcf249bc85daa77d4b976

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-haystack-needlechecksum
303121091
date
Tue, 21 Jan 2020 13:56:49 GMT, Tue, 21 Jan 2020 13:56:49 GMT
last-modified
Thu, 28 Feb 2019 00:59:13 GMT
access-control-allow-origin
*
content-type
image/jpeg
status
200
content-disposition
attachment
cache-control
max-age=1209600, no-transform
x-needle-checksum
2647768984
x-fb-config-version-olb-prod
677
content-length
1014

Redirect headers

strict-transport-security
max-age=15552000; preload
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
302
x-fb-rev
1001623320
alt-svc
h3-24=":443"; ma=3600
content-length
0
pragma
no-cache
x-fb-debug
g+65czaKuH3/xTPYcViD73mqvjpnGMdKOBq/UDPaPYrfwE9Lz+YvLtlXcZBg547048VuU4W1BXPiMIGPNVy+Uw==
x-fb-trace-id
HSLwPneb0zP
date
Tue, 21 Jan 2020 13:56:48 GMT, Tue, 21 Jan 2020 13:56:48 GMT
location
https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207008&hash=AeRuH8W8s4kfy4td
content-type
image/jpeg
access-control-allow-origin
*
x-fb-request-id
A4FGNzGCugkaOrinXZWnJea
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.11
expires
Sat, 01 Jan 2000 00:00:00 GMT
500_333.jpg
i.blogs.es/499429/poco2/
31 KB
31 KB
Image
General
Full URL
https://i.blogs.es/499429/poco2/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
bf1c443a827273d6b26bbd062a28b9096387587863bf1cf0583c88778cb8290b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:02:46 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Tue, 21 Jan 2020 12:59:37 GMT
server
AmazonS3
age
3243
etag
"b8457f73e3103bf3fbfd414f920f2b14"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
31367
x-amz-cf-id
IDnyslAUB33UyMgbN-h8KTFHUXAL9AOC0mygQvWGWW3bMEarpkp-rQ==
500_333.jpg
i.blogs.es/8e0e80/instagram/
52 KB
52 KB
Image
General
Full URL
https://i.blogs.es/8e0e80/instagram/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
cbcc56855ce6374616c16c788f239f5cf55ec86b8b50b03b56970dfad494efcc

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 12:11:22 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Tue, 21 Jan 2020 12:02:59 GMT
server
AmazonS3
age
6327
etag
"1e1ae87c276265b3d7e61df40b6495eb"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
52858
x-amz-cf-id
j4Y3YYBSDteiX2fcM3OgzVK2oWdstT4N5eb6iLUVC5QUelv5dNcOHg==
500_333.jpg
i.blogs.es/44566a/opensource/
29 KB
29 KB
Image
General
Full URL
https://i.blogs.es/44566a/opensource/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
1260ecc58be538d24c0a71138356afbc452c5c2bb182246d5354fcdf332a54dc

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 12:11:22 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Tue, 21 Jan 2020 09:49:39 GMT
server
AmazonS3
age
6327
etag
"61fd583fb5390949cecd1861329c91ce"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
29708
x-amz-cf-id
0Tt2Yh3jIflMRVPTVI3TtR14cCKkQRBRTr2scCePa0EKMKM8Vl5X9Q==
500_333.jpg
i.blogs.es/a35450/nacho-monge-samsung-tv/
36 KB
36 KB
Image
General
Full URL
https://i.blogs.es/a35450/nacho-monge-samsung-tv/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c278c8a700999a18448631a9c15226e3387c288d798f1945a27aebfea5b22d7f

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 11:17:38 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Mon, 20 Jan 2020 12:30:51 GMT
server
AmazonS3
age
9551
etag
"bfcea677aa7ab6d687c50c6ad0a0ab43"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
36950
x-amz-cf-id
rz6ByNI1UYlvRIarMPGPvlFQEVHlMMMcSxKff1YQnLnxUx_xzfL7Gg==
650_1200.png
ti.blogs.es/16ac21/captura-de-pantalla-2020-01-07-a-las-15.57.42/
673 KB
674 KB
Image
General
Full URL
https://ti.blogs.es/16ac21/captura-de-pantalla-2020-01-07-a-las-15.57.42/650_1200.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.38 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-38.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
592ecd87c45bffdd59f7d80bc3bfe22e8df17ef881d7295d9213113dc02c9f6c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 07 Jan 2020 15:22:29 GMT
via
1.1 3283735112d0a322451d32ef038129c9.cloudfront.net (CloudFront)
last-modified
Tue, 07 Jan 2020 14:57:56 GMT
server
AmazonS3
age
1204461
etag
"160e83a50833f0fe574c4ec30c3764f4"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
689028
x-amz-cf-id
ksHaFPIFPRN3rJHpspIPWzKSf-jtEp_iU2Vb9J68CFNZMwD4G1I08Q==
150_150.png
i.blogs.es/dd52d1/ransomware/
6 KB
7 KB
Image
General
Full URL
https://i.blogs.es/dd52d1/ransomware/150_150.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6f2256265e487a257c99c444646f59e7efd09e1984412bb5d83b446c65dfb3fd

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Mon, 04 Nov 2019 15:09:01 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"4dbc59d36f0fb533b8817c3bb11c0384"
x-cache
Miss from cloudfront
content-type
image/png
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
6642
x-amz-cf-id
B4pu3IFyySWXuz3Wgj_IOgqkZgYlYC8IQ8JoXMJzjEH-33jz-WQZ4A==
150_150.jpg
i.blogs.es/ec411d/chrome/
5 KB
6 KB
Image
General
Full URL
https://i.blogs.es/ec411d/chrome/150_150.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
aa3a5299a1b3897d3ff1698157e54b9ef7f4a5322b5edbfbfffbdec1320e932e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Wed, 06 Nov 2019 13:06:50 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"2a1740c3e31db8f6438924ed5cc4effa"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
5486
x-amz-cf-id
YPM9CXxGZNON8dFqaq5Cp3CTqZMg3Api1nYNZFOFSwPOWmMlDqZZwg==
150_150.jpg
i.blogs.es/99b388/tadas-sar-t01gzhbsymq-unsplash/
4 KB
4 KB
Image
General
Full URL
https://i.blogs.es/99b388/tadas-sar-t01gzhbsymq-unsplash/150_150.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
44c9927b0cc5b5c3469d487d8b67b708772bdca56decc6e745b72592b4d8c7ac

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Tue, 14 Jan 2020 19:13:20 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"dbb419b5280308f0d3e8a028ea2c8ebc"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
3602
x-amz-cf-id
DAUXLU05kz_9cqK5kzaqNGdFTw8FhTdimQm6PM9EPjma3kpS7Z7uyA==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?event=view&campaignId=8498&medium=recommended_posts&device=desktop
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-67.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 07 Jan 2020 15:22:29 GMT
Via
1.1 91db3e27f70759a0dea967c4b34efea9.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
Age
1204461
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Hit from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
X-Amz-Cf-Pop
FRA53
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
5HpxFbQhan3eR5i1RMtSp8xXi0grgGv7cpE1w63m5PcZroBbFP5nWQ==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?event=view&editorialCampaignId=1350
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-67.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 09 Jan 2020 07:28:44 GMT
Via
1.1 1015c68f2d8c45924ae7198c984dcdde.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
Age
1060086
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Hit from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
X-Amz-Cf-Pop
FRA53
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
3JhHKmbmooMZzDvg5lt3_ZMluICio1Fp3SLrY9E-DSxhqvTkXLTTxQ==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?recommendationsAction=view&device=desktop&recommendationVersion=309&campaign=recommended_club&containers=v12,v12,v12,v12,v12,top3MonthCategoryPosts
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-67.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:50 GMT
Via
1.1 36c13eeffcddf77ad33d7874b28e6168.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA53
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Miss from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
TQPClehORb7UWNxK9FXjwC3r_BFjXqM3uEAJ5zDUA6Pp87wOxY6DGQ==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?sidebarRecommendations=view&device=desktop&recommendationVersion=309&containers=top3MonthCategoryPosts,top3MonthCategoryPosts,v12
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-67.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:20:05 GMT
Via
1.1 23082ff4de65f70078e091bc7cd0cf24.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
Age
2205
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Hit from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
X-Amz-Cf-Pop
FRA53
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
3-ZXqZ-8d1noqBbZZNkDtfRSFfT_ZIBXfHZSnbp1KzTwHsNdA7oxYg==
moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
636dbf4f87fa130596fdb491938e4ad2b693b397139ba7f8d2a34b738a494078

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:38:02 GMT
Server
ECS (fcn/40D2)
Age
1004687
Etag
"352656b32c7e3a4e623687d598b66f66+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7937
tweet.2d3dab8467c8e4cdce5682bb8dbbe4cd.js
platform.twitter.com/js/
17 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/js/tweet.2d3dab8467c8e4cdce5682bb8dbbe4cd.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A0) /
Resource Hash
87c40d1935f1b97602939d59a8bb89f9c4453f04db5af06fad9eae9a9f73b45c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:38:02 GMT
Server
ECS (fcn/41A0)
Age
1004687
Etag
"f236198db47744d3d5115002e9724381+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
5738
xd_arbiter.php
staticxx.facebook.com/connect/ Frame 13F9
0
0
Document
General
Full URL
https://staticxx.facebook.com/connect/xd_arbiter.php?version=45
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
staticxx.facebook.com
:scheme
https
:path
/connect/xd_arbiter.php?version=45
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
content-type
text/html; charset=utf-8
expires
Sat, 16 Jan 2021 20:16:01 GMT
strict-transport-security
max-age=15552000; preload
content-encoding
gzip
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
cache-control
public,max-age=31536000,immutable
x-fb-debug
ylJfktcdDO5K3Oy8r6l0p+3A4+UzVpmQgz2lAb99cl3zpBkSHwHzN0Id2PZo3s4VeczJjv28E/f+z5tzFTk9Lg==
content-length
12379
x-fb-trip-id
1850256238
date
Tue, 21 Jan 2020 13:56:49 GMT Tue, 21 Jan 2020 13:56:49 GMT
alt-svc
h3-24=":443"; ma=3600
status
www.facebook.com/x/oauth/
0
0
Fetch
General
Full URL
https://www.facebook.com/x/oauth/status?client_id=360028941603&input_token&origin=1&redirect_uri=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&sdk=joey&wants_cookie_data=true
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/
Origin
https://www.genbeta.com

Response headers

pragma
no-cache
x-fb-debug
YMOrf3Ky7Fh/I4xJEcAi1WGRgrXaIVSv+vcvZCH4KETFvBDFg3YDx7gtYGzSPwDHgDccu1qVLIEidxcwTawAWg==
fb-s
unknown
status
200
date
Tue, 21 Jan 2020 13:56:49 GMT, Tue, 21 Jan 2020 13:56:49 GMT
strict-transport-security
max-age=15552000; preload
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-expose-headers
fb-s
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-24=":443"; ma=3600
content-length
0
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
graph.facebook.com/
156 B
614 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&method=get&pretty=0&sdk=joey&suppress_http_code=1
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
743b662ee5c1080429fc4e26af7f0b829e95c236167466479a348b2ab5a53a52
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

strict-transport-security
max-age=15552000; preload
etag
"b6a8171c6e8566d59355f74569c9e39030ea1986"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
1001623205
alt-svc
h3-24=":443"; ma=3600
content-length
156
pragma
no-cache
x-fb-debug
+UGte4U4gSKSqw+qzMmDVJeWMd5c8dGfqh/nuoHMUxcXa2onMSM2AN9vnWnBvm+hWNPWtJcOzq1Z25epAyLOAw==
x-fb-trace-id
AhP6C60BuDe
date
Tue, 21 Jan 2020 13:56:49 GMT, Tue, 21 Jan 2020 13:56:49 GMT
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
x-fb-request-id
AE3Cz0k1taFOBpeM2CIZyru
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.11
expires
Sat, 01 Jan 2000 00:00:00 GMT
eu_country.php
static.sunmedia.tv/SMVpaidCreatives/geotarget/
19 B
315 B
XHR
General
Full URL
https://static.sunmedia.tv/SMVpaidCreatives/geotarget/eu_country.php
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
2fd18698a9c07c01ed01e19274ad4cd456e1faabc8b226a17efc63b3220ef3e2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
tp-cache
HIT
server
nginx
age
337395
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
https://www.genbeta.com
content-length
19
country.php
services.sunmedia.tv/geotarget/
16 B
260 B
XHR
General
Full URL
https://services.sunmedia.tv/geotarget/country.php
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
762bea50b1d8bdd1c7f7004cdad0951e4e72ebfa8a9486532b5da32eb4a173e1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
tp-cache
HIT
server
nginx
age
337372
vary
Accept-Encoding
content-type
application/json
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
https://www.genbeta.com
content-length
16
intext-1-0.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
3 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/intext-1-0.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
08cab8137683bffc64b24806380c01dd8c16961b1b743831b77e6b21a4e60ce9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
tp-cache
HIT
last-modified
Wed, 11 Dec 2019 18:55:21 GMT
server
nginx
age
531439
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
2568
accept-ranges
bytes
x-device
desktop
outstream.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
4 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/outstream.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
c7ef7c6a54790c868c5d7e400a17a922f3d646fe8a47d98db133070da6a5fe34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
tp-cache
HIT
last-modified
Wed, 18 Dec 2019 21:20:23 GMT
server
nginx
age
531439
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
3403
accept-ranges
bytes
x-device
desktop
adblockDetector.js
static.sunmedia.tv/SMSdk/assets/AdBlockDetection/
13 KB
5 KB
Script
General
Full URL
https://static.sunmedia.tv/SMSdk/assets/AdBlockDetection/adblockDetector.js
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
4984c39b03cddab1198a70add535b4600ac615d3e938edbec8d2d8b53b9f0a60

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:16 GMT
server
nginx
age
531439
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
content-length
4831
syndication
syndication.twitter.com/i/jot/
43 B
337 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1579615009159%2C%22dnt%22%3Afalse%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
109
pragma
no-cache
last-modified
Tue, 21 Jan 2020 13:56:49 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
2edd6c9b0b28dfecaafdc35dc96571f0
x-transaction
001dea4d001b490a
expires
Tue, 31 Mar 1981 05:00:00 GMT
tweets.json
cdn.syndication.twimg.com/
7 KB
2 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/tweets.json?callback=__twttr.callbacks.cb0&ids=1217495681230954506&lang=es&suppress_response_codes=true&theme=light&tz=GMT%2B0100
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
tsa_f /
Resource Hash
a114aed475c6723ae2f472da3ef7c0e337f02ad8bed6c4afdb4129b526f563cc
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
1767
x-xss-protection
0
x-response-time
130
last-modified
Tue, 21 Jan 2020 13:56:49 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=60
x-connection-hash
4d0639e86cc34e98083c5675e1aba308
timing-allow-origin
*
x-transaction
004e58680052aa34
expires
Tue, 21 Jan 2020 13:57:49 GMT
tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
platform.twitter.com/css/
52 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash
5a9b0bcc0e7274386f0f560595519d66ee86bfccf57e76f2e59a6985091fa3a2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:37:57 GMT
Server
ECS (fcn/41AD)
Age
1004687
Etag
"7a92a961c027712f349e184a0eafdd76+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11516
tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
platform.twitter.com/css/
52 KB
52 KB
Image
General
Full URL
https://platform.twitter.com/css/tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:37:57 GMT
Server
ECS (fcn/41AD)
Age
1004687
Etag
"7a92a961c027712f349e184a0eafdd76+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11516
Y8ZMw5bX_normal.png
pbs.twimg.com/profile_images/1104435625065922560/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1104435625065922560/Y8ZMw5bX_normal.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4199) /
Resource Hash
671c6ea4947184712008aff5d0d4a932c447caf52f38b5fec1da41a0024b5438
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
x-content-type-options
nosniff
age
165077
x-cache
HIT
status
200
content-length
1883
x-response-time
124
surrogate-key
profile_images profile_images/bucket/8 profile_images/1104435625065922560
last-modified
Sat, 09 Mar 2019 17:33:47 GMT
server
ECS (fcn/4199)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
6522c30e1e48cc0883caf57ce4211c9d
accept-ranges
bytes
EOVp2G6WkAAH867
pbs.twimg.com/media/
19 KB
20 KB
Image
General
Full URL
https://pbs.twimg.com/media/EOVp2G6WkAAH867?format=jpg&name=360x360
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4195) /
Resource Hash
80425682e60844c09aa2f54600090b013306814583fde0138705388b53a29917
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
x-content-type-options
nosniff
age
506342
x-cache
HIT
status
200
content-length
19841
x-response-time
338
surrogate-key
media media/bucket/9 media/1217495652562800640
last-modified
Wed, 15 Jan 2020 17:13:58 GMT
server
ECS (fcn/4195)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
bec1b7b8cf543303b0cfdcc598f5a881
accept-ranges
bytes
EOVp2HOWoAIC756
pbs.twimg.com/media/
16 KB
16 KB
Image
General
Full URL
https://pbs.twimg.com/media/EOVp2HOWoAIC756?format=jpg&name=360x360
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D8) /
Resource Hash
b6413062d977eca6bb8370fdcbd468c0035683c62be0090b207c3667a05f209c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
x-content-type-options
nosniff
age
506412
x-cache
HIT
status
200
content-length
16447
x-response-time
483
surrogate-key
media media/bucket/6 media/1217495652646690818
last-modified
Wed, 15 Jan 2020 17:13:58 GMT
server
ECS (fcn/40D8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2c75de3ceffe25f016321c8c91cd8174
accept-ranges
bytes
truncated
/
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4468e35646c229b518e5f398c5a3d6b15ba1351a71ef22692129bb32f5030ac0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0341a4478ce861ef85c819b913fa0a2501836a6a2ffda8643e95e39f4a2a7de0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
512 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49c2a3cf0f363bf387c06a35a4a4e6c7255799b3776bed55914862136d783028

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
600 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c50a17e8272b9359e4b62e0f305e201f359cb5bd2245671c115d031f2b7f68d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
323 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c3531ed2c934e5daee80955db42a0245d666131e6322c6ec6985992922520ab4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
jot
syndication.twitter.com/i/
43 B
124 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22widget_origin%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%22%2C%22widget_frame%22%3Afalse%2C%22widget_site_screen_name%22%3A%22genbeta%22%2C%22widget_creator_screen_name%22%3A%22tonienblanc%22%2C%22item_ids%22%3A%5B%221217495681230954506%22%5D%2C%22item_details%22%3A%7B%221217495681230954506%22%3A%7B%22item_type%22%3A0%7D%7D%2C%22unbucketed%22%3Atrue%2C%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1579615009446%2C%22dnt%22%3Afalse%2C%22client_version%22%3A%22a383441%3A1578551069153%22%2C%22format_version%22%3A1%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22section%22%3A%22subject%22%2C%22component%22%3A%22tweet%22%2C%22action%22%3A%22results%22%7D%7D
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
118
pragma
no-cache
last-modified
Tue, 21 Jan 2020 13:56:49 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
2edd6c9b0b28dfecaafdc35dc96571f0
x-transaction
00eab3d3001a50d7
expires
Tue, 31 Mar 1981 05:00:00 GMT
500_333.jpeg
i.blogs.es/14dbfd/2/
46 KB
47 KB
Image
General
Full URL
https://i.blogs.es/14dbfd/2/500_333.jpeg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4413f15294a312ef9255eefaaa05c4d64f9a789d05d273f0afa5fcc1d0ff3591

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 20 Jan 2020 03:56:59 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Thu, 14 Nov 2019 12:04:35 GMT
server
AmazonS3
age
122391
etag
"1256fb06c411b27c1fc4bf04b45c472e"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
47513
x-amz-cf-id
Gl5bqGmvgMkWeycWyCQYFaqZNQnACmD_EkuH_Q3RtJyLrqq-MNbqgA==
500_333.jpg
i.blogs.es/d5ef2d/office-620822_1280/
33 KB
33 KB
Image
General
Full URL
https://i.blogs.es/d5ef2d/office-620822_1280/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
725cebce635485adfd44c0b7b51676d58df9ad6717f5ee0078a4743a822cd62f

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Mon, 16 Sep 2019 15:32:45 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"e30ff546186e3d48415f363e6fefd568"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
33695
x-amz-cf-id
A94G8K-gNbd3bXmuZzUwaVWIsmNdhVWGckp4dWpGVSaWzwvG4tLong==
500_333.jpg
i.blogs.es/be4b6f/sim/
12 KB
13 KB
Image
General
Full URL
https://i.blogs.es/be4b6f/sim/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a050e5629a8cd624d913855e885a20d0bd741f03260e0f1027008577e9917388

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Fri, 13 Sep 2019 14:29:24 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"4a7789037cef25f5a36fc20063927903"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
12660
x-amz-cf-id
Oesdm5Zt3jUQORXxxMBRtnsZpDOzWtPcnmOCmNsNmUEE0z6ask07pQ==
500_333.jpg
i.blogs.es/c144cd/170322-f-jl266-1042/
55 KB
56 KB
Image
General
Full URL
https://i.blogs.es/c144cd/170322-f-jl266-1042/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
27ec82ab0fc7a4cf6bab22dbba550c387642a2b71b6103e1decd8b75af9c008d

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Tue, 14 Jan 2020 19:27:06 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"f944df2f834a0aa04a11df3a158b6563"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
56770
x-amz-cf-id
YOkteyGkSHrxH8gC5MjbV8Y7WbdBEW1vUSZhx__Kjs18-T3fJOAsUQ==
500_333.jpg
i.blogs.es/b39094/technology-3068617_1280/
13 KB
14 KB
Image
General
Full URL
https://i.blogs.es/b39094/technology-3068617_1280/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c495000a84a489951260d478b003db2373ecf2b0843ef56bfab76c25ee31f052

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Fri, 30 Aug 2019 14:00:16 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"6fc7c9d0c2e74d62cc5b6328b9a1af8a"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
13679
x-amz-cf-id
oEY12HhhZWpXOjyvrC14v7pNorxFxubRpyApzSyjIKI9AMyFMJUxEA==
500_333.jpg
i.blogs.es/674ea0/intel/
38 KB
39 KB
Image
General
Full URL
https://i.blogs.es/674ea0/intel/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c49b62f14d2c18caaf17499d1591119b737055d9ad1f93c24d1032eaeb48a2cb

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Wed, 07 Aug 2019 08:33:14 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"85dbdc52586579240421aff3f13932db"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
39364
x-amz-cf-id
8ijqCCwv_SotnsokHZir0DBRZRkFdjTiObwjTpJ0ovCspAYNIlPEjQ==
500_333.jpg
i.blogs.es/56b911/1366_2000-1-/
34 KB
34 KB
Image
General
Full URL
https://i.blogs.es/56b911/1366_2000-1-/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.24 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3992613e3162eb65d97aae08a2e40fc2b9762282a65dcafc8d42acee2c16f355

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
last-modified
Mon, 11 Nov 2019 14:30:48 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"8fdabd1acb10f836bd4f4ed624cb2b71"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
34313
x-amz-cf-id
xU-nxD9Tfy6pDjY7WET2zWr2NUIdNUk08VJcr9RrXykUtB7eT1JiYg==
jot.html
platform.twitter.com/ Frame FAE8
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40EA) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://www.genbeta.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
1004687
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
Content-Type
text/html; charset=utf-8
Date
Tue, 21 Jan 2020 13:56:49 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Thu, 09 Jan 2020 22:50:11 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40EA)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 21 Jan 2020 13:56:49 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 21 Jan 2020 13:56:49 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
2edd6c9b0b28dfecaafdc35dc96571f0
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
111
x-transaction
0091eec800b99623
x-tsa-request-body-time
0
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
29 KB
8 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4470515615870287&correlator=1773869783381979&output=ldjh&impl=fifs&adsid=NT&eid=21062833&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu_parts=1018282%2CGEB-LAT-interior%2CGEB-CEN-interior%2CGEB-CEN2-interior%2CGEB-LAT2-interior%2CGEB-BOT2-interior%2CGEB-TOP-interior%2CGEB-INT-interior%2CGEB-HOOK-interior%2CGEB-INT2-interior&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9&prev_iu_szs=160x600%7C300x250%7C300x600%7C300x1000%2C300x250%7C670x250%7C728x90%7C970x90%7C970x250%7C1000x250%2C300x250%7C670x250%7C728x90%7C970x90%7C970x250%7C1000x250%2C160x600%7C300x250%7C300x600%7C300x1000%2C300x250%7C728x90%2C728x90%7C970x90%7C970x250%7C1000x250%2C1x1%2C1x1%2C1x1&ists=6&prev_scp=amznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7C%7C%7C&eri=1&cust_params=type%3Dpost%26source%3D%26site%3DGEB%26siteSection%3Dpostpage%26mapping%3D%26vertical%3DTechnology%26postId%3D303854%26postUrl%3Dhttps%253A%252F%252Fwww.genbeta.com%252Fseguridad%252Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%26publishDate%3D2020-01-16T15%253A30%253A41%26modifiedDate%3D2020-01-16T16%253A35%253A30%26categories%3Dactualidad%252Cwindows%252Cseguridad%26tags%3Dmicrosoft%252Cgithub%252Cnsa%252Cwindows-10%26videoContent%3D%26partner%3D%26blockLength%3D7&cookie_enabled=1&bc=31&abxe=1&lmt=1579615010&dt=1579615010675&dlt=1579615007659&idt=1104&frm=20&biw=1585&bih=1200&oid=3&adxs=1177%2C643%2C643%2C1177%2C643%2C429%2C0%2C0%2C0&adys=835%2C3611%2C6216%2C2222%2C6908%2C263%2C8623%2C8624%2C8623&adks=146516415%2C226713633%2C3758333503%2C3415502118%2C1448882304%2C3253970734%2C505953648%2C3726518922%2C3213885034&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=56&icsg=861812034560&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x616%7C1585x290%7C1585x290%7C300x616%7C1585x266%7C1585x118%7C1585x1200%7C1585x1200%7C1585x1200&msz=300x616%7C1585x266%7C1585x266%7C300x616%7C1585x266%7C1585x118%7C1x-1%7C1x-1%7C1x-1&ga_vid=1262737677.1579615011&ga_sid=1579615011&ga_hid=287850354&fws=4%2C4%2C4%2C4%2C4%2C0%2C0%2C0%2C0&ohw=1585%2C1585%2C1585%2C1585%2C1585%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e12e2b3c3e48a576a540a1e9799ce504919ccd18d6bf92e952cdb7ffa0e9aafa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7175
x-xss-protection
0
google-lineitem-id
4376690798,4376394703,4376717018,4376702390,4376411476,4376655278,4946230481,-2,5075350927
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138207640505,138207643007,138207633280,138207641027,138228614002,138207628486,138258918420,-2,138271338930
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:50 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

view
securepubads.g.doubleclick.net/pcs/ Frame CC63
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsurIL3a2FcCE7I89lN7kqLcs38rZuI-HqIAhjMfYypPxElsQeOoHxPHVq57fhaqhbqjIXxax0wEdSDu5goMAuopPj2VOBF1NgbrzrjTQH89wHMfoVCvey-77G6v3EeMFEkKklE0Bv_gocVxFCx4sRJ9d-3V_n98rou1VYF7JayejNUp2llZK2iwmDAeYdH-MkH1zJOA1BBbDC-pmp_EQc-P8uSJXPvCaEQOCNxaU9cWr9qoVzkjLHcmTQs-G_6bIykGy4z9vkKO01pgfA&sai=AMfl-YSzXCSVI6E6XFhKtkxI9xLb2VtUGjU7EL5ba1C71SkVwDVVGy12ZoxHUd6qbAcLNnkWo9Qte0eCbyeH1a0iLaiPxW9A9csrWBEzS8iH&sig=Cg0ArKJSzPxoHlz_g2UfEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
rtg.js
s.richaudience.com/ Frame CC63
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame CC63
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame BC28
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu7DM_T8UjyIl3Zla3OCco5ji5nZyVk8ocN9Z_WEFLuw3UK5nquQf8UjUIz_doBwxVL1k_IIG5gJe831vkIevZjHi5fj7PFT5JAZjJLgSsOuy3zhR7yP8hwg17iYskscf2Zn1rtKx3uvq_UIPOHj5JYEsKcDAmU1E9A7JI-fGza2TfKyUD4yHKy6LX1ZreTSxh6euhAw6c0QURflJl6hWh1i3ZXJTuM81pvzvvOALNtZSyb4IpOQw_pi11srPfrFUJHkB2SOlQ2FPp7og&sai=AMfl-YS0s411EIx7EyLS5lD2v0xJ06UwqvhzbJ4ooatjd5wLQbcNK0MD-z-A3ogntcPeoJiDWxra4nr4Mg3ovwdGrpMABlNumGQZyPy6AC0j&sig=Cg0ArKJSzDN_3LwHxDxLEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
rtg.js
s.richaudience.com/ Frame BC28
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame BC28
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 6D6C
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssQd0W4HIclZDkLuBkEFoC10oH7ODwBWoB7EasjtVWTpl1NQYtMtrr--FKsNfB8z5oxvGUwwOssZk0lkDwDO5hO-WTnGfl8rVnBlCKDjtRp_Huoqge7Kina-IExGQkjDda3ypSjtmAuf0govYZD2s-rVY-IBUXWHCRjNx935y781cmp_0lWghJpfgP4rCEPUsG7cRlD34TmOJJ6HVhNqsIfRyO7HZWZwgoebwZfB6-Hn1GGudViHJatp9Mdv6yGL4rWEUNfdI54B3H8PQ&sai=AMfl-YSoc75mygrI_VUrxcbjcUE4_cXEmbDuz5Z9Rt1PxhHmfibdBXJzEdu3NCRCdmo9tOuQXuwsNj8GkzBMdkfJ785ICcEq7RjvrOQUAcn2&sig=Cg0ArKJSzNH7rOmaMrmLEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
rtg.js
s.richaudience.com/ Frame 6D6C
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 6D6C
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 1ECB
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuToqZ4B2EbGUYa3vopiMPLILm9j09Bmdr8eT_7BjSo_SHaodcNkLLjlAStSeZ2AVU0uUusFscgvFbZUQUSxKBwMcbHHaqxaIrB1aff9EmOuXIHSU8I6xYZWkaNYVBxJkuAy9-4rk4vRUQYLTbUCfZzryqU9Q63-lJYAf9AQUUJA3Cdj_2OfdrOaX60Tg1RMhiG6xgtMsS8Wb5uBkXX8DXWKWzXYTmDpMYSPUfaRnpYo48HY-AgF1LzRtYcUFpJHY7P_gSO281OTevqeOw&sai=AMfl-YQLsdF_C3LI3SfMhU6z9RK1h7iWtCUiayG60wbARmyn0iaonQ5K9BE-2rrDhng6R1mSOpIUrMP66f0ueEqah-Kg9f7eKxtsjI32Yb3e&sig=Cg0ArKJSzB20eGWbykwHEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
rtg.js
s.richaudience.com/ Frame 1ECB
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 1ECB
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 8BAA
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsttuGG6SO3IJ_s5wQthpXveu4b9r-VmKGjyE8wsxR7u6-ytQBpujFuoJtVpQg3rRy1pBOCQhYck8MLvHvJDzj-H9tUc49LMOaJ3O8Rqst8s5DM3kk1TvlRYO5_cpeFlwhqhlE8a9PBpSPr2WMwiO0pinehD4IF5AEjzVVccL1F7F3qCRBxce-quVw-i6vss_4DqpQWe0xG6rVOXdlaCXMJ8wM4kbxvvuYgLa4is3Zogxn2nWEc88Ciekp_iVq95aAF-REnjqY3oDTsIww&sai=AMfl-YSQTTU_JbDgcSotjkFUgTzhJjeU5O8GdF_FeUXweoVUyt-ReiLI37NJKvuaFnI6cZW0V3WDYf9S-HfwLW-47d932XXEVLXD33-AE_RP&sig=Cg0ArKJSzDqW4GyBNt9hEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
rtg.js
s.richaudience.com/ Frame 8BAA
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8BAA
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 8DE4
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvhYBxRc9qIX2jGpSahY1wP-JmYsExLsVQaZE5T92sDv4X9KkirkXZ9ZI-q0hmiCH0dBaHO0QD0AJgohCkD1y6XYV4R2x42_gWCi1fJZC2R_6s0iT8QeIQDhWRGUhaARaqwtPjsQK0xUaX2lmZy7FBoaVaYeLGw-33LQYI8fGYLsDRlalNM52MeuoCGZo3D2vcvN3aK7zxCJiqyrLEzllaDzz9S28Ghi7C2PwdOF-K4K09NhjqaIrFYeIPVCZFLIOl6hKafIvUdKYELvQ&sai=AMfl-YQoF4o529lGJuvNeNH3WmuLELlvXtLr9FbDf_BQ9Qy382-J_WQVpl54x2gzJnPOTKLZdGRB69RlpQp-AyYW28SPoqSa-O_lX98zgZN8&sig=Cg0ArKJSzFb30WZWUb1cEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
rtg.js
s.richaudience.com/ Frame 8DE4
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8DE4
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
5baf737f-da12-4681-9454-c2f95ffccda1.js
static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/
Redirect Chain
  • https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssmBVkxp9RsclEH64xpuRbBl_j-7oFMurJXmh3s-nEXfeXWdXx1xQxIqNQQ2ylFCxRh2_0IDc8a3dB6acnTIMzvM7d-FT4mmQlE6IOnPwdE_iNSK9rqhkZCgsmXMATDtThi157nMEHpW...
  • https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
158 KB
42 KB
Script
General
Full URL
https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
703e694165f09ec10c460d71b0428e95bebd81db21eb8918ddab1cf4673e215b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Fri, 10 Jan 2020 09:05:04 GMT
server
nginx
age
967824
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592001
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
42916

Redirect headers

date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
content-type
text/html; charset=UTF-8
server
cafe
access-control-allow-origin
*
location
https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
truncated
/ Frame 734F
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
235f38c9ba497482be915c6261ffd60dd75c337cd525785eab799097135a3b7c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 1075
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssQ3yQqJgih2EK0r-iQAINUBxauXiIdrVGiqHvVgGl8I8woOAfWO_dLH4NnNp5XiX4kLJQDPEdjnGgFllSv0DkVMDPIQ88Gbb38U3AaQa_h_drT_cKbhEABSOrbczVRHROAbJwQsASWcq9hJ2eU6J0Uh1tEb6UI1qo9VOp46OsuDbkvurKI9R0PlqVQc4Pvzopw_47kBUczuAvfaktYmPmZcHkuHnEA92ZO1gEJa9VMi1CktWlDjrVQwOAk0n9lErTej1qrBaOreyQ&sai=AMfl-YT8fo6ZXP3DEr3uHw3dh1tiwuy1oPc_cNlDD5PQUdezRL6cfIKRzYWDyGHRWmkOU40S5WuKJjUxHLEdv3PVgVHXfoj8rzWWNXgSLjis&sig=Cg0ArKJSzDNbT9qimSIlEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:51 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
/
s.richaudience.com/mgc/0pk1yTLOmb/ Frame 1075
3 KB
1 KB
Script
General
Full URL
https://s.richaudience.com/mgc/0pk1yTLOmb/?ord=1201164488&hasConsent=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
9d75ceede8beaf01dd92dbba90f0849984a0f1d7c30d71b9e10630399ac9d5aa

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 1075
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
truncated
/ Frame 6D6C
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a8ce0c6022d5c7d32718a5fb19696662f4b210e73bef6b3cb2054965e920e8d9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 8BAA
206 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
701a1c4bae844377dff0009a4d7472548fc856819a81315a02455273e9cc8336

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
/
sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/ Frame F31F
0
0
Document
General
Full URL
https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=3527055505005&pubconsent=&euconsent=&hasConsent=
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash

Request headers

Host
sync.richaudience.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Server
nginx/1.14.2
Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Encoding
gzip
ads.js
s.richaudience.com/srv/Z8ESoglTAn/ Frame 29AC
21 KB
5 KB
Script
General
Full URL
https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
5eb01da53ec343de9baf58519141c2cc8909cc5b4c5f559e6924b621bda5ccd8

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame CC63
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c000151d1c7b6617a0b66c01f24128c04d517759c91e7e8b3d2ab3943c84a6ee

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/KHBtcc0SeM/ Frame 1532
18 KB
5 KB
Script
General
Full URL
https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
47d649743c68437765dba2556652331cc1df75d162b24444ba22c1ec9de618c5

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame 1ECB
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
98bfa649b3438a111820ab6798b59a652a4154d4437c86a95de553840a261334

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/1R8nVe8Ta9/ Frame D10C
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
4cbd6a7fa43824594e18ebc76e225399be958ad6ac55c0c18374f876c34dc425

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame 8DE4
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2ae52d97a19e11f84be44802eac1bac69078df45632fdce4408d8574853ea8ae

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/0PLEmFvsNc/ Frame 4534
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
34ed0e663c38d080da3d9eecbba609441080c8bba6af8dee89d071f903d25056

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame BC28
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b480ebe087bdcbc4618e645fb05fc53e54e02df99a8de13cc50ca1de9375abed

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
cert.js
rosetta.richmediastudio.com/c/590d66a7e033eb2197da79fe9a594ddc/
11 KB
2 KB
Script
General
Full URL
https://rosetta.richmediastudio.com/c/590d66a7e033eb2197da79fe9a594ddc/cert.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/mgc/0pk1yTLOmb/?ord=1201164488&hasConsent=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.222.198.105 Paris, France, ASN16276 (OVH, FR),
Reverse DNS
ip105.ip-92-222-198.eu
Software
nginx/1.6.2 /
Resource Hash
6e346ae1bd971e9383706871c9b1c9e5989e2e299705bde15ade09a86e6301b2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:47:37 GMT
Content-Encoding
gzip
Last-Modified
Wed, 30 Oct 2019 15:11:21 GMT
Server
nginx/1.6.2
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
close
truncated
/ Frame 1075
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
76178c65eb537e666dc3002c920766ce2f997938de4980d4b3bce9f2cff8d4fb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/0tqVvISHce/ Frame B7A6
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/0tqVvISHce/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
87304b61a58c5649d1aac8e425e92a988ce4af65b36f85d48e25ca812ad527f8

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
ads.js
s.richaudience.com/srv/0QWIUh3Mr5/ Frame 8E76
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
414442fba364d7820f519d6dbbd5b4bbb8b2b5a2ebcd88960472d0da7d409b2d

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame 29AC
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
cab53e8c3aaeb12d19f8ab3a5cc65398f4b4b7c40b422cfce56fb1441d609149
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 831 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
beacon.js
sb.scorecardresearch.com/ Frame 29AC
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:51 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame 1532
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
cab53e8c3aaeb12d19f8ab3a5cc65398f4b4b7c40b422cfce56fb1441d609149
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 135 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
beacon.js
sb.scorecardresearch.com/ Frame 1532
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:51 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame D10C
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
b9436b2c1742cba4ae24d3d9ef4fbb9d2ee21a52370cc23ccb97985f48fb1227
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 42 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16134
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
beacon.js
sb.scorecardresearch.com/ Frame D10C
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:51 GMT
country.php
services.sunmedia.tv/geotarget/
16 B
260 B
XHR
General
Full URL
https://services.sunmedia.tv/geotarget/country.php
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
762bea50b1d8bdd1c7f7004cdad0951e4e72ebfa8a9486532b5da32eb4a173e1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
tp-cache
HIT
server
nginx
age
337372
vary
Accept-Encoding
content-type
application/json
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
https://www.genbeta.com
content-length
16
inhome-1-0.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
3 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/inhome-1-0.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
086a531cdcde16e63f40598b4553dc6be92acaf9f62e51c867cdaef29ac441ef

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
tp-cache
HIT
last-modified
Mon, 30 Dec 2019 14:24:09 GMT
server
nginx
age
531442
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
2577
accept-ranges
bytes
x-device
desktop
outstream.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
4 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/outstream.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
c7ef7c6a54790c868c5d7e400a17a922f3d646fe8a47d98db133070da6a5fe34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
tp-cache
HIT
last-modified
Wed, 18 Dec 2019 21:20:23 GMT
server
nginx
age
531441
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
3403
accept-ranges
bytes
x-device
desktop
adblockDetector.js
static.sunmedia.tv/SMSdk/assets/AdBlockDetection/
13 KB
5 KB
Script
General
Full URL
https://static.sunmedia.tv/SMSdk/assets/AdBlockDetection/adblockDetector.js
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
4984c39b03cddab1198a70add535b4600ac615d3e938edbec8d2d8b53b9f0a60

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:16 GMT
server
nginx
age
531441
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
content-length
4831
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame 4534
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
cab53e8c3aaeb12d19f8ab3a5cc65398f4b4b7c40b422cfce56fb1441d609149
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 312 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
beacon.js
sb.scorecardresearch.com/ Frame 4534
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:51 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame B7A6
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0tqVvISHce/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
cab53e8c3aaeb12d19f8ab3a5cc65398f4b4b7c40b422cfce56fb1441d609149
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 653 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
beacon.js
sb.scorecardresearch.com/ Frame B7A6
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0tqVvISHce/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:51 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame 8E76
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
cab53e8c3aaeb12d19f8ab3a5cc65398f4b4b7c40b422cfce56fb1441d609149
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 54 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
beacon.js
sb.scorecardresearch.com/ Frame 8E76
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:51 GMT
b2
sb.scorecardresearch.com/ Frame 29AC
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011455&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2F...
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011455&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011455&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011455&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.be/adsid/ Frame 29AC
109 B
778 B
Script
General
Full URL
https://adservice.google.be/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 29AC
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 29AC
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
integrator.js
adservice.google.be/adsid/ Frame 1532
109 B
171 B
Script
General
Full URL
https://adservice.google.be/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 1532
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 1532
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
b2
sb.scorecardresearch.com/ Frame 1532
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011481&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2F...
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011481&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011481&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011481&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.be/adsid/ Frame D10C
109 B
171 B
Script
General
Full URL
https://adservice.google.be/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame D10C
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_modern_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame D10C
148 KB
56 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
68cd548aa29feb4fa1f4cd0daa2ad241ce4526ba2570b753785435be4fe6331f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
57387
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
integrator.js
adservice.google.be/adsid/ Frame 4534
109 B
171 B
Script
General
Full URL
https://adservice.google.be/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 4534
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 4534
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
integrator.js
adservice.google.be/adsid/ Frame B7A6
109 B
171 B
Script
General
Full URL
https://adservice.google.be/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame B7A6
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame B7A6
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
b2
sb.scorecardresearch.com/ Frame D10C
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011503&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2F...
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011503&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011503&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011503&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
b2
sb.scorecardresearch.com/ Frame B7A6
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011507&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2F...
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011507&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011507&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011507&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
b2
sb.scorecardresearch.com/ Frame 4534
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011508&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2F...
  • https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011508&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011508&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011508&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.be/adsid/ Frame 8E76
109 B
171 B
Script
General
Full URL
https://adservice.google.be/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 8E76
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 8E76
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
b
sb.scorecardresearch.com/ Frame 8E76
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615011513&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/ Frame 29AC
40 KB
12 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2256366072974296&correlator=2763760361778340&output=ldjh&impl=fif&eid=21064170%2C21064550&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2FZ8ESoglTAn&sz=300x250%7C300x600%7C1x1%7C1x1&scp=raiFrmt%3D300x250%26raiPlcmnt%3DZ8ESoglTAn%26plc_avw%3D50%26raiHou%3D5%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D1c390159a083c670%3AT%3D1579615010%3AS%3DALNI_MbPQQucEHfpuY3PliMGD2PumtHBVw&cdm=www.genbeta.com&bc=31&lmt=1579615011&dt=1579615011547&dlt=1579615011344&idt=196&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=1247&ady=767&adk=3744438713&uci=j7y3rycalog4&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x250&msz=0x250&ga_vid=1455973826.1579615012&ga_sid=1579615012&ga_hid=297656177&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
2ad5ec488d7749a4b9e6f7954afb8258bba88506c69d24d73d790c31386c238c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
11948
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 29AC
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 29AC
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/ Frame 1532
40 KB
12 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=930204662428185&correlator=817440992556903&output=ldjh&impl=fif&adsid=NT&eid=21062751%2C21062833&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2FKHBtcc0SeM&sz=300x250%7C300x600%7C1x1%7C1x1&scp=raiFrmt%3D300x250%26raiPlcmnt%3DKHBtcc0SeM%26plc_avw%3D60%26raiHou%3D2%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D1c390159a083c670%3AT%3D1579615010%3AS%3DALNI_MbPQQucEHfpuY3PliMGD2PumtHBVw&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615011&dt=1579615011576&dlt=1579615011352&idt=218&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=1247&ady=2138&adk=3651211567&uci=hjdcepydvmxc&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x250&msz=0x250&ga_vid=737114913.1579615012&ga_sid=1579615012&ga_hid=426675248&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
3fafce2795614181ee1691ec304a555dd8dfecf3b4d30aeea533380c5c3c9e9f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
11972
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 1532
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 1532
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

rtg.js
s.richaudience.com/
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/mgc/0pk1yTLOmb/?ord=1201164488&hasConsent=1
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
ads
securepubads.g.doubleclick.net/gampad/ Frame D10C
60 KB
18 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=570629780019060&correlator=2076518439411401&output=ldjh&impl=fif&adsid=NT&eid=21065316%2C21062833%2C21065099%2C21065203%2C21065318&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2F1R8nVe8Ta9&sz=728x90%7C970x250%7C970x90%7C1x1%7C1x1&scp=raiFrmt%3D728x90%26raiPlcmnt%3D1R8nVe8Ta9%26plc_avw%3D60%26raiHou%3D52%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D1c390159a083c670%3AT%3D1579615010%3AS%3DALNI_MbPQQucEHfpuY3PliMGD2PumtHBVw&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615011&dt=1579615011606&dlt=1579615011359&idt=232&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=293&ady=261&adk=867554721&uci=u5gv2nxnwbmj&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x90&msz=0x90&ga_vid=789502027.1579615012&ga_sid=1579615012&ga_hid=1820225449&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
1e9d5a8dd211662dab58b4fa85e1cb16be3e4647a2a14a6f50fa8826202ab48e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
18109
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_modern_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame D10C
61 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2020011301.js?21065316
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
884b6fccd46557ef3c27fb33d5b8125436c6e04225af8d90cc33aeb8d5ee8fdc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24270
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame D10C
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/ Frame B7A6
40 KB
12 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1429303801372756&correlator=3025646385693091&output=ldjh&impl=fif&adsid=NT&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2F0tqVvISHce&sz=300x250%7C1x1%7C1x1&scp=raiFrmt%3D300x250%26raiPlcmnt%3D0tqVvISHce%26plc_avw%3D0%26raiHou%3D7%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D1c390159a083c670%3AT%3D1579615010%3AS%3DALNI_MbPQQucEHfpuY3PliMGD2PumtHBVw&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615011&dt=1579615011621&dlt=1579615011402&idt=213&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=643&ady=6808&adk=3998681620&uci=929g792p0g25&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x250&msz=0x250&ga_vid=611835469.1579615012&ga_sid=1579615012&ga_hid=708382402&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
41566bcfa8ba6ba827b152b807749b47fedbd02688a075c4320069c931f3f5ee
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
11988
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame B7A6
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame B7A6
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/ Frame 4534
60 KB
18 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1465207395459823&correlator=1104172618360676&output=ldjh&impl=fif&adsid=NT&eid=21062832%2C21062889%2C21064169&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2F0PLEmFvsNc&sz=728x90%7C970x250%7C1x1%7C1x1&scp=raiFrmt%3D728x90%26raiPlcmnt%3D0PLEmFvsNc%26plc_avw%3D20%26raiHou%3D20%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D1c390159a083c670%3AT%3D1579615010%3AS%3DALNI_MbPQQucEHfpuY3PliMGD2PumtHBVw&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615011&dt=1579615011629&dlt=1579615011366&idt=258&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=643&ady=3543&adk=3750205645&uci=p2pcl4cam1dc&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x90&msz=0x90&ga_vid=1270308561.1579615012&ga_sid=1579615012&ga_hid=486865019&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
b33f20d045742ccf63e889383f47f9a6c7582533d4e7b336bc3555f8e2b6d8ff
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
18098
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 4534
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 4534
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/ Frame 8E76
60 KB
18 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2430223714378118&correlator=533089686916558&output=ldjh&impl=fif&adsid=NT&eid=21062452%2C21064212&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2F0QWIUh3Mr5&sz=728x90%7C970x250%7C970x90%7C1x1%7C1x1&scp=raiFrmt%3D728x90%26raiPlcmnt%3D0QWIUh3Mr5%26plc_avw%3D0%26raiHou%3D20%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D1c390159a083c670%3AT%3D1579615010%3AS%3DALNI_MbPQQucEHfpuY3PliMGD2PumtHBVw&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615011&dt=1579615011639&dlt=1579615011407&idt=227&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=643&ady=6132&adk=622523489&uci=cgz1j5mple84&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x90&msz=0x90&ga_vid=1764327770.1579615012&ga_sid=1579615012&ga_hid=624966523&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
0f01639cee75533277afe9eaeb087fc4235e601718628ccd8299197a27fa2eee
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
18072
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 8E76
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 8E76
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads.js
s.richaudience.com/hi/1zJTYRzk06/
4 B
126 B
Script
General
Full URL
https://s.richaudience.com/hi/1zJTYRzk06/ads.js?rnd=48832849&sw=1600&sh=1200&ipmref=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&hasConsent=1
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.230 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.230.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 4525
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 21 Jan 2020 10:15:40 GMT
expires
Wed, 20 Jan 2021 10:15:40 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
13271
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame B7A6
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:51 GMT
/
t.richaudience.com/ Frame B7A6
43 B
121 B
Image
General
Full URL
https://t.richaudience.com/?s=235&p=0tqVvISHce&cn=0&cm=0&i=0&e=1&lct=b7bc20f6ba9b75e2b2f9635a57aeedc8bb8a9628aa5a052666d8136d3ba6e809&jpt=b7bc20f6ba9b75e2b2f9635a57aeedc8bb8a9628aa5a052666d8136d3ba6e809&stn=d6acfc7306f6dfcd03596eaaf272dea6b0f18491d17715cf47e215067fd4cb4c&mrc=d6acfc7306f6dfcd03596eaaf272dea6b0f18491d17715cf47e215067fd4cb4c&rnd=6798759955311&v=0cb0ae126dca5036bd9463a38b148e2d167e129e7b9f9a666b5dd34e45484820&type=3&subtype=1&idplatform=5&env_id=1&pid=788&gdpr_con=0&advd=&nde=&raplayer=0&prebid=0&tc=1&rs=5f228a142ee89b8c7a7cef5b7f8da034&sgn=dZD6wTilkf36nDdEEb6K2mTs8D2i%2Fzpt2RNw91pdS5MHyUd6GS548aIbKqPcaQKwM5B0XeWAdTp48KzX%2B4l69ITtt5t55FNBIuFsxuEvHOuhbyfMXMEcTSzuuI8Fx3OZniPT2KHoYwKYks5cKA2%2BHGTOMyXNQwRreU2rj7RCVGyW9CLDwrN%2BYCuUphlEau62OsYktIde%2BMPKMWvh4XM3MhkaZHpCwXLxkxZfEDZkQsavEVbitEnAbQ8NySy5awjgnS6sXxzk8dh%2BZzdRwSJh%2BYZBF9T5usvWjrzQGsRJwCgurGMKxFz8cMxu&dsp=0&rmshash=0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.221.208 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-31-221-208.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
aa03dc59bdca72631d2301e4297cfa030bd31b907dc138e7b973d12311c90a22

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:52 GMT
server
nginx/1.14.1
content-type
image/gif
/
sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
867 B
616 B
Script
General
Full URL
https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash
683fdd8d76c87a4115e00cb18fca4792d420941c64c8128a91012beb7a7fca8e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Server
nginx/1.14.2
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:2c00:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dc82de33871a9ed40a5379ed264dd0456d9bf58839286b913231648f527bc72b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 20 Jan 2020 18:55:29 GMT
via
1.1 1015c68f2d8c45924ae7198c984dcdde.cloudfront.net (CloudFront)
last-modified
Tue, 22 Oct 2019 20:22:52 GMT
server
AmazonS3
age
68482
etag
"f53f55cbab099be3a970b446a66c496a"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
3167
x-amz-cf-id
O5Ca_x9a9U_TN3biYhs8pAkktgSVW0FD8g4OpurIH2W5Z1ThYn5wvA==
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:51 GMT
extra.js
static.sunmedia.tv/SMSdk/extra/weblogs/general/
48 KB
11 KB
Script
General
Full URL
https://static.sunmedia.tv/SMSdk/extra/weblogs/general/extra.js?1579615009120
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
e62700721988cda248e9df162f21fd6427b7858f9250a01eac426855e36bc81d

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:47 GMT
server
nginx
age
531294
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
content-length
11500
p2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=911227457&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=911227457&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_c...
43 B
589 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=911227457&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=3710082&cs_ak_ss=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:52 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=911227457&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=3710082&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=94bd3813-9f84-4f72-b389-6d6e4bf4888b&tp=op&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:51 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521398
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 5A9E
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 21 Jan 2020 10:15:40 GMT
expires
Wed, 20 Jan 2021 10:15:40 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
13272
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame D10C
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:52 GMT
/
t.richaudience.com/ Frame D10C
43 B
121 B
Image
General
Full URL
https://t.richaudience.com/?s=235&p=1R8nVe8Ta9&cn=0&cm=0&i=0&e=1&lct=ae6982b8288e5ca0cc0f1cd09feec209d5d2208d79b37e84fad361263a14903e&jpt=ae6982b8288e5ca0cc0f1cd09feec209d5d2208d79b37e84fad361263a14903e&stn=38b51f95c3c0413daae0b9cd1d91b8eb8e569d3f5522f5852477f3722d71b19f&mrc=38b51f95c3c0413daae0b9cd1d91b8eb8e569d3f5522f5852477f3722d71b19f&rnd=6089718773840&v=e1d6748528cb6879ae6f6e0b3f9423b7e18507f68e2ae87bfe9c534c3cbcf102&type=3&subtype=2&idplatform=5&env_id=1&pid=778&gdpr_con=0&advd=&nde=&raplayer=0&prebid=0&tc=1&rs=5f228a142ee89b8c7a7cef5b7f8da034&sgn=dZD6wTilkf36nDdEEb6K2mTs8D2i%2Fzpt2RNw91pdS5MHyUd6GS548aIbKqPcaQKwM5B0XeWAdTp48KzX%2B4l69ITtt5t55FNBIuFsxuEvHOuhbyfMXMEcTSzuuI8Fx3OZniPT2KHoYwKYks5cKA2%2BHGTOMyXNQwRreU2rj7RCVGyW9CLDwrN%2BYCuUphlEau62OsYktIde%2BMPKMWvh4XM3MhkaZHpCwXLxkxYKQjBiFJemFlK%2BtErDZQsCyi22OQi2zH%2BnWxTk%2B44uNGNWznJg%2FNkSGNPyvZePj%2BiAHchOkSguqmRckgeuec5s&dsp=0&rmshash=0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.221.208 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-31-221-208.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
aa03dc59bdca72631d2301e4297cfa030bd31b907dc138e7b973d12311c90a22

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:52 GMT
server
nginx/1.14.1
content-type
image/gif
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 6C72
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 21 Jan 2020 10:15:40 GMT
expires
Wed, 20 Jan 2021 10:15:40 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
13272
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 4534
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:52 GMT
/
t.richaudience.com/ Frame 4534
43 B
121 B
Image
General
Full URL
https://t.richaudience.com/?s=235&p=0PLEmFvsNc&cn=0&cm=0&i=0&e=1&lct=1ded1db7b09d51920dcf150a39a9eac18c31251361cb36d52ca9c3d313a72bf7&jpt=1ded1db7b09d51920dcf150a39a9eac18c31251361cb36d52ca9c3d313a72bf7&stn=0e741daacb6ead3d9cbb7c7d59473c0a9db643ea5561008c938ca076d735ac4c&mrc=0e741daacb6ead3d9cbb7c7d59473c0a9db643ea5561008c938ca076d735ac4c&rnd=8707635300290&v=b8a1ce0e6edb2e504aaca9e095c9f653acf47c800c0a550b51c34da0dc6ed267&type=3&subtype=2&idplatform=5&env_id=1&pid=784&gdpr_con=0&advd=&nde=&raplayer=0&prebid=0&tc=1&rs=5f228a142ee89b8c7a7cef5b7f8da034&sgn=dZD6wTilkf36nDdEEb6K2mTs8D2i%2Fzpt2RNw91pdS5MHyUd6GS548aIbKqPcaQKwM5B0XeWAdTp48KzX%2B4l69ITtt5t55FNBIuFsxuEvHOuhbyfMXMEcTSzuuI8Fx3OZniPT2KHoYwKYks5cKA2%2BHGTOMyXNQwRreU2rj7RCVGyW9CLDwrN%2BYCuUphlEau62OsYktIde%2BMPKMWvh4XM3MhkaZHpCwXLxkxYNSzVlQMauRlbjs0rHOAkLnynhPF%2FqmS2tCE7pr4t5MGcEkHNnqIcUENXwvceCiOjTSZIekH97%2BTNcxgGseshp&dsp=0&rmshash=0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.221.208 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-31-221-208.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
aa03dc59bdca72631d2301e4297cfa030bd31b907dc138e7b973d12311c90a22

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:52 GMT
server
nginx/1.14.1
content-type
image/gif
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame EFA0
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 21 Jan 2020 10:15:40 GMT
expires
Wed, 20 Jan 2021 10:15:40 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
13272
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 29AC
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:52 GMT
/
t.richaudience.com/ Frame 29AC
43 B
121 B
Image
General
Full URL
https://t.richaudience.com/?s=235&p=Z8ESoglTAn&cn=0&cm=0&i=0&e=1&lct=61b91d5514945b3b05276762630314fef3314834ce156ed5ead5ab283d99c0eb&jpt=61b91d5514945b3b05276762630314fef3314834ce156ed5ead5ab283d99c0eb&stn=e6f8e5e760706a11c4d478b3934485ae0900521d9201760fd1f9733ed4bb5735&mrc=e6f8e5e760706a11c4d478b3934485ae0900521d9201760fd1f9733ed4bb5735&rnd=3861398643557&v=9bb1726d3eb5d260cc3766deef8a46dc14fe3da78311c2cc0e693700ed80d0d1&type=3&subtype=1&idplatform=5&env_id=1&pid=780&gdpr_con=0&advd=&nde=&raplayer=0&prebid=0&tc=1&rs=5f228a142ee89b8c7a7cef5b7f8da034&sgn=dZD6wTilkf36nDdEEb6K2mTs8D2i%2Fzpt2RNw91pdS5MHyUd6GS548aIbKqPcaQKwM5B0XeWAdTp48KzX%2B4l69ITtt5t55FNBIuFsxuEvHOuhbyfMXMEcTSzuuI8Fx3OZniPT2KHoYwKYks5cKA2%2BHGTOMyXNQwRreU2rj7RCVGyW9CLDwrN%2BYCuUphlEau62OsYktIde%2BMPKMWvh4XM3MhkaZHpCwXLxkxZWETZlFJGoR1PjtR2RbwoLyCuzaAjlmHjxWxWx%2FYsoYDdTkCJjr94TGIXx7ZGF2%2BnWHccUlywq%2BTJbyFSseJpv&dsp=0&rmshash=0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.221.208 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-31-221-208.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
aa03dc59bdca72631d2301e4297cfa030bd31b907dc138e7b973d12311c90a22

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:52 GMT
server
nginx/1.14.1
content-type
image/gif
/
d.agkn.com/iframe/8613/ Frame 2458
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=695687890&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Technolgy%20%26amp%3B%20Computer%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:3e00:19:fc2c:a140:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

:method
GET
:authority
d.agkn.com
:scheme
https
:path
/iframe/8613/?che=695687890&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Technolgy%20%26amp%3B%20Computer%22%2C%22brd%22%3A%22-1%22%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
content-type
text/html;charset=UTF-8
content-length
481
cache-control
no-cache, must-revalidate
date
Tue, 21 Jan 2020 13:56:52 GMT
expires
Sat, 01 Jan 2000 00:00:00 GMT
p3p
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
pragma
no-cache
server
Apache-Coyote/1.1
set-cookie
ab=0001%3Av%2BC%2FD2bdNhnAoKf1ApT%2FdbIxx601m9Em;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAlub-kJbm_pAAAAAAAAg1RAQCADVIBAIA;Max-Age=31536000;domain=agkn.com;path=/
x-cache
Miss from cloudfront
via
1.1 e8929a64b6920fabf88f772b8cd0125c.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-amz-cf-id
fD3ZkEgmeamuVq-rifAgYq1P5ktPNBBbQWNwSCBUAqpniXJ32Vmeaw==
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame A7F1
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 21 Jan 2020 10:15:40 GMT
expires
Wed, 20 Jan 2021 10:15:40 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
13272
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 1532
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:52 GMT
/
t.richaudience.com/ Frame 1532
43 B
121 B
Image
General
Full URL
https://t.richaudience.com/?s=235&p=KHBtcc0SeM&cn=0&cm=0&i=0&e=1&lct=ad9a62e3336ff4f351fc9f06b152aed9ea09e2038a7767215f88da495b8eb131&jpt=ad9a62e3336ff4f351fc9f06b152aed9ea09e2038a7767215f88da495b8eb131&stn=c953f4337e9e48fc5130a3add464fa55ab54940b0984ab965692c1c928054a56&mrc=c953f4337e9e48fc5130a3add464fa55ab54940b0984ab965692c1c928054a56&rnd=5169756911921&v=4476c385b335a72958c2b8ca7d7c752223688145a1d0c51dd0f736e0b186e985&type=3&subtype=1&idplatform=5&env_id=1&pid=782&gdpr_con=0&advd=&nde=&raplayer=0&prebid=0&tc=1&rs=5f228a142ee89b8c7a7cef5b7f8da034&sgn=dZD6wTilkf36nDdEEb6K2mTs8D2i%2Fzpt2RNw91pdS5MHyUd6GS548aIbKqPcaQKwM5B0XeWAdTp48KzX%2B4l69ITtt5t55FNBIuFsxuEvHOuhbyfMXMEcTSzuuI8Fx3OZniPT2KHoYwKYks5cKA2%2BHGTOMyXNQwRreU2rj7RCVGyW9CLDwrN%2BYCuUphlEau62OsYktIde%2BMPKMWvh4XM3MhkaZHpCwXLxkxZbR2NiQJCmFgK15B2Uag4CnnDjbVzrn3yjWRqz%2Foh%2BMTRUwH9o%2BosRQYek7JGCie6CSJcaly1%2F%2BTUOyFKtccZr&dsp=0&rmshash=0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.221.208 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-31-221-208.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
aa03dc59bdca72631d2301e4297cfa030bd31b907dc138e7b973d12311c90a22

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:52 GMT
server
nginx/1.14.1
content-type
image/gif
b
sb.scorecardresearch.com/
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=21892462&c3=1001000630&ns__t=1579615012194&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:52 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
SMPlayer_d.css
static.sunmedia.tv/SMSdk/css/SMVast/
4 KB
1 KB
Stylesheet
General
Full URL
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
194b85c10c911ac7a204d734b732c3b7af39682d9690273d56d0fc808be650a8

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
531442
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
text/css
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
*
content-length
963
267639
search.spotxchange.com/vast/2.0/
67 B
1 KB
XHR
General
Full URL
https://search.spotxchange.com/vast/2.0/267639?VPAID=JS&content_page_url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&cb=724122778&player_width=696&player_height=392&custom_skin=1&ad_volume=0&regs[gdpr]=1&user[consent]=1&schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
185.94.180.123 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
78e958d620d6e40a19e424eee3a9b23932cd9bfa4d7f736442048777d203052d

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:52 GMT
Content-Encoding
gzip
X-SpotX-Timing-Transform
0.004597
X-SpotX-Timing-SpotMarket
0.264511
X-SpotX-Timing-Page-Mux
0.000353
X-SpotX-Timing-Page-Require
0.000474
X-fe
038
Connection
keep-alive
X-SpotX-Timing-Page-Cookie
0.000028
Content-Length
76
X-SpotX-Timing-Page
0.273636
Pragma
no-cache
X-SpotX-Timing-Page-Context
0.000419
Last-Modified
Tue, 21 Jan 2020 13:56:52 GMT
Server
nginx
Cache-Control
no-cache, must-revalidate, post-check=0, pre-check=0
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Vary
Accept-Encoding
X-SpotX-Timing-SpotMarket-Primary
0.081447
Content-Type
text/xml;charset=UTF-8
Access-Control-Allow-Origin
https://www.genbeta.com
X-SpotX-Timing-Page-Misc
0.003213
X-SpotX-Timing-Page-Exception
0.000001
X-SpotX-Timing-SpotMarket-Secondary
0.183064
X-SpotX-Timing-Page-URI
0.000039
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=94bd3813-9f84-4f72-b389-6d6e4bf4888b&tp=req&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521398
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 9F7E
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 21 Jan 2020 10:15:40 GMT
expires
Wed, 20 Jan 2021 10:15:40 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
13272
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 8E76
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:52 GMT
/
t.richaudience.com/ Frame 8E76
43 B
121 B
Image
General
Full URL
https://t.richaudience.com/?s=235&p=0QWIUh3Mr5&cn=0&cm=0&i=0&e=1&lct=0f7e4bb0d6acc61a7f0d6309d8f899162ba09e72f069a2ac1f6e54019ebf1905&jpt=0f7e4bb0d6acc61a7f0d6309d8f899162ba09e72f069a2ac1f6e54019ebf1905&stn=f8e8b33b27f3062a0bc338f5a4e04deb408c8a09ce978733db08bb919a23853d&mrc=f8e8b33b27f3062a0bc338f5a4e04deb408c8a09ce978733db08bb919a23853d&rnd=6093637834701&v=4f648f9b77140ae2927b2e7c3af72c42599dd86cb73d00e0d06d1595ed121e6f&type=3&subtype=2&idplatform=5&env_id=1&pid=786&gdpr_con=0&advd=&nde=&raplayer=0&prebid=0&tc=1&rs=5f228a142ee89b8c7a7cef5b7f8da034&sgn=dZD6wTilkf36nDdEEb6K2mTs8D2i%2Fzpt2RNw91pdS5MHyUd6GS548aIbKqPcaQKwM5B0XeWAdTp48KzX%2B4l69ITtt5t55FNBIuFsxuEvHOuhbyfMXMEcTSzuuI8Fx3OZniPT2KHoYwKYks5cKA2%2BHGTOMyXNQwRreU2rj7RCVGyW9CLDwrN%2BYCuUphlEau62OsYktIde%2BMPKMWvh4XM3MhkaZHpCwXLxkxZbFWJgG8WnQVex5hzFPFkJknq3PQy2y36nXEvn%2B954MTNezyM084lHQoHzuMKH3bqCSMdJlS4j%2FDJbwVb5Lcg4&dsp=0&rmshash=0
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.221.208 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-31-221-208.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
aa03dc59bdca72631d2301e4297cfa030bd31b907dc138e7b973d12311c90a22

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:56:52 GMT
server
nginx/1.14.1
content-type
image/gif
/
sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/ Frame E732
0
0
Document
General
Full URL
https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=9327061&pubconsent=1&euconsent=1&hasConsent=1
Requested by
Host: sync.richaudience.com
URL: https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash

Request headers

Host
sync.richaudience.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Server
nginx/1.14.2
Date
Tue, 21 Jan 2020 13:56:52 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Encoding
gzip
css
fonts.googleapis.com/
767 B
400 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
b4723b5b14abe7a2062b65bf79b4d5d1e575e786a439e61ff95a38e7e9e140e9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Tue, 21 Jan 2020 13:56:52 GMT
server
ESF
access-control-allow-origin
*
date
Tue, 21 Jan 2020 13:56:52 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:52 GMT
sound-on.png
static.sunmedia.tv/SMSdk/ico/
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
531443
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
fullscreen-on.png
static.sunmedia.tv/SMSdk/ico/
1 KB
2 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/fullscreen-on.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
7a000f38eb0e9764341b690ff8c931c309a4392e7b35c157652864658ab406eb

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
531443
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
1351
accept-ranges
bytes
x-device
desktop
skip.png
static.sunmedia.tv/SMSdk/ico/
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/skip.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
47fd77ed50c61b270cf73b6b71c5ae29d7b46023ea1e3d2f646858d839c927bb

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:02 GMT
server
nginx
age
531443
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2761
accept-ranges
bytes
x-device
desktop
adlabel.png
static.sunmedia.tv/SMSdk/ico/
1 KB
2 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/adlabel.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
4cf86b8273ac1a15c23684145f8035a0e3c9d67942f62cb44bb8b95bd7465877

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
531443
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
1359
accept-ranges
bytes
x-device
desktop
play.png
static.sunmedia.tv/SMSdk/ico/
1 KB
2 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/play.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
dd4473796fb0eda44798d1802b139e99b54cdf783a2df05f0be684481238c151

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
531443
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
1525
accept-ranges
bytes
x-device
desktop
855c843c-c46c-46a8-994a-d0500eeecff5
vast.sunmedia.tv/creatives/
1 KB
701 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/855c843c-c46c-46a8-994a-d0500eeecff5
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
8e3194a6bf96d447a6e3d867e9d185b37bedc8b7e94eda83c1de94aac757ee08

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
855c843c-c46c-46a8-994a-d0500eeecff5.js
creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/ Frame 1EBC
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
a0d5546ce119affaaa50a99bdfaa74694692790ead83bf8a0b276865e31052f0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:52 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 08 Jan 2020 12:15:25 GMT
server
nginx
age
1129282
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35878
activeview
pagead2.googlesyndication.com/pcs/ Frame 8DE4
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuZWgksswcUxaaFgFv_8StmSmkPuR_DDOZSAVmk02MjFDm_mXZHv0B9u3--9B2UT09StuWMPgtSfkhhijSt7tiQL_rAHt9UkvqovtygSkg&sig=Cg0ArKJSzNZOMORIWyn0EAE&adk=3253970734&tt=-1&bs=1585%2C1200&mtos=1100,1100,1100,1100,1742&tos=1532,0,0,0,210&p=247,293,501,1293&mcvt=1100&rs=3&ht=0&tfs=371&tls=2113&mc=1&lte=1&bas=0&bac=0&met=ce&la=1&avms=nio&exg=1&md=2&lm=2&rst=1579615011246&dlt&rpt=149&isd=0&msd=0&ext&imams=1&xdi=0&ps=1585%2C9329&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-15-2-14-14-0-0-0&tvt=2112&is=1000%2C254&iframe_loc=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&r=v&id=osdim&vs=4&uc=15&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200117
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:53 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame C24A
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:53 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
531444
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
indisplay_general_ava.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame C24A
896 B
659 B
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
012fc52dc8464e217227a5e7ffb217786966db23b38d5ef8a6ca46e8f051b9ae

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:53 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
1264
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
424
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 1EBC
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=SMAdFactory
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:53 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521399
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 1EBC
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=adl
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:53 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521399
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ced.sascdn.com/tag/1999/ Frame C24A
24 KB
10 KB
Script
General
Full URL
https://ced.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.113 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-113.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
98fc00528a207dee025a6c14d3b5ddea456fe2a07a10cf88ff197e1cf1057141

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:54 GMT
Content-Encoding
gzip
Cache-Control
public, max-age=193
Content-Length
10143
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
/
sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
867 B
614 B
Script
General
Full URL
https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash
0d0e827fde6f3cb6a198460ea03290e44b8d7b078566668aebd87ea00e25c4d9

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:54 GMT
Content-Encoding
gzip
Server
nginx/1.14.2
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:2c00:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dc82de33871a9ed40a5379ed264dd0456d9bf58839286b913231648f527bc72b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 20 Jan 2020 18:55:29 GMT
via
1.1 1015c68f2d8c45924ae7198c984dcdde.cloudfront.net (CloudFront)
last-modified
Tue, 22 Oct 2019 20:22:52 GMT
server
AmazonS3
age
68484
etag
"f53f55cbab099be3a970b446a66c496a"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
3167
x-amz-cf-id
YwbMdCgHdDI7wIUehLiIKQS9Z_J2hCKBjJZCUSZTbseHCmNZ27zqgw==
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:53 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:56:53 GMT
207956
search.spotxchange.com/vast/2.0/
67 B
1 KB
XHR
General
Full URL
https://search.spotxchange.com/vast/2.0/207956?VPAID=JS&content_page_url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&cb=860637562&player_width=420&player_height=236&custom_skin=1&ad_volume=0&regs[gdpr]=1&user[consent]=1&schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
185.94.180.123 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
78e958d620d6e40a19e424eee3a9b23932cd9bfa4d7f736442048777d203052d

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:54 GMT
Content-Encoding
gzip
X-SpotX-Timing-Transform
0.000505
X-SpotX-Timing-SpotMarket
0.116191
X-SpotX-Timing-Page-Mux
0.000196
X-SpotX-Timing-Page-Require
0.000325
X-fe
044
Connection
keep-alive
X-SpotX-Timing-Page-Cookie
0.000035
Content-Length
76
X-SpotX-Timing-Page
0.120247
Pragma
no-cache
X-SpotX-Timing-Page-Context
0.000322
Last-Modified
Tue, 21 Jan 2020 13:56:54 GMT
Server
nginx
Cache-Control
no-cache, must-revalidate, post-check=0, pre-check=0
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Vary
Accept-Encoding
X-SpotX-Timing-SpotMarket-Primary
0.066119
Content-Type
text/xml;charset=UTF-8
Access-Control-Allow-Origin
https://www.genbeta.com
X-SpotX-Timing-Page-Misc
0.002661
X-SpotX-Timing-Page-Exception
0.000000
X-SpotX-Timing-SpotMarket-Secondary
0.050072
X-SpotX-Timing-Page-URI
0.000012
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p
sb.scorecardresearch.com/
43 B
589 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=681619720&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=9596269
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:53 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=5baf737f-da12-4681-9454-c2f95ffccda1&tp=op&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:53 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521399
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=5baf737f-da12-4681-9454-c2f95ffccda1&tp=req&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:53 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521399
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=5baf737f-da12-4681-9454-c2f95ffccda1&tp=ef&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:53 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521399
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
d.agkn.com/iframe/8613/ Frame 1CFE
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=1568215&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Business%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:3e00:19:fc2c:a140:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

:method
GET
:authority
d.agkn.com
:scheme
https
:path
/iframe/8613/?che=1568215&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Business%22%2C%22brd%22%3A%22-1%22%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
cookie
u=C|0AEAlub-kJbm_pAAAAAAAAg1RAQCADVIBAIA; ab=0001%3Av%2BC%2FD2bdNhnAoKf1ApT%2FdVMBw7PJGlE84Loljjv9Sp32%2BckuCuflfw%3D%3D
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
content-type
text/html;charset=UTF-8
content-length
481
cache-control
no-cache, must-revalidate
date
Tue, 21 Jan 2020 13:56:53 GMT
expires
Sat, 01 Jan 2000 00:00:00 GMT
p3p
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
pragma
no-cache
server
Apache-Coyote/1.1
set-cookie
ab=0001%3Av%2BC%2FD2bdNhnAoKf1ApT%2FdVMBw7PJGlE84Loljjv9Sp32%2BckuCuflfw%3D%3D;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAlub-kJbm_pQAAAAABAg1RAQEADVIBAQA;Max-Age=31536000;domain=agkn.com;path=/
x-cache
Miss from cloudfront
via
1.1 e8929a64b6920fabf88f772b8cd0125c.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-amz-cf-id
qRgmhgsR954xwECWksLoVAUrfIp3ICelbRvOv8GUis9CzDGyR9hoRA==
b
sb.scorecardresearch.com/
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=21892462&c3=1001000630&ns__t=1579615013912&ns_c=UTF-8&cv=3.1e&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:53 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
855c843c-c46c-46a8-994a-d0500eeecff5
vast.sunmedia.tv/creatives/
1 KB
701 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/855c843c-c46c-46a8-994a-d0500eeecff5
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
8e3194a6bf96d447a6e3d867e9d185b37bedc8b7e94eda83c1de94aac757ee08

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:54 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
855c843c-c46c-46a8-994a-d0500eeecff5.js
creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/ Frame C624
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
a0d5546ce119affaaa50a99bdfaa74694692790ead83bf8a0b276865e31052f0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:54 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 08 Jan 2020 12:15:25 GMT
server
nginx
age
1129284
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35878
ac
www8.smartadserver.com/ Frame C24A
22 B
2 KB
Script
General
Full URL
https://www8.smartadserver.com/ac?nwid=1999&siteid=281855&pgid=1039313&fmtid=70691&async=1&visit=m&tmstp=4639750423&tag=sas_70691&sh=1200&sw=1600&pgDomain=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&noadcbk=sas.noad
Requested by
Host: ced.sascdn.com
URL: https://ced.sascdn.com/tag/1999/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.43 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
3850020bf3d555d772316cf9a0dd1a07f374aed3fd305e667b69c812adc0ebf3

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:54 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
X-SMRT-D
3%3b16%3b101
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Cache-Control
no-cache, no-store
Content-Type
application/javascript; charset=utf-8
Content-Length
140
Expires
-1
/
sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/ Frame EDE9
0
0
Document
General
Full URL
https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=3892891&pubconsent=1&euconsent=1&hasConsent=1
Requested by
Host: sync.richaudience.com
URL: https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash

Request headers

Host
sync.richaudience.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Server
nginx/1.14.2
Date
Tue, 21 Jan 2020 13:56:54 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Encoding
gzip
/
track.sunmedia.tv/ Frame C624
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=SMAdFactory
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521401
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame C87A
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
531445
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
indisplay_general_ava.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame C87A
896 B
659 B
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
012fc52dc8464e217227a5e7ffb217786966db23b38d5ef8a6ca46e8f051b9ae

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
1265
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
424
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame C624
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=adl
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521401
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ced.sascdn.com/tag/1999/ Frame C87A
24 KB
10 KB
Script
General
Full URL
https://ced.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.113 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-113.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
98fc00528a207dee025a6c14d3b5ddea456fe2a07a10cf88ff197e1cf1057141

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:55 GMT
Content-Encoding
gzip
Cache-Control
public, max-age=192
Content-Length
10143
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
ac
www8.smartadserver.com/ Frame C87A
22 B
2 KB
Script
General
Full URL
https://www8.smartadserver.com/ac?nwid=1999&siteid=281855&pgid=1039313&fmtid=70691&async=1&visit=m&tmstp=5628288735&tag=sas_70691&sh=1200&sw=1600&pgDomain=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&noadcbk=sas.noad
Requested by
Host: ced.sascdn.com
URL: https://ced.sascdn.com/tag/1999/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.43 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
3850020bf3d555d772316cf9a0dd1a07f374aed3fd305e667b69c812adc0ebf3

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:54 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
X-SMRT-D
3%3b15%3b81
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Cache-Control
no-cache, no-store
Content-Type
application/javascript; charset=utf-8
Content-Length
140
Expires
-1
v2
es-sunelespanol.videoplaza.tv/proxy/distributor/
59 KB
4 KB
XHR
General
Full URL
https://es-sunelespanol.videoplaza.tv/proxy/distributor/v2?s=RONIT/Desktop&tt=p&rt=vast_2.0&rnd=209322608&pf=fl_11&dcid=pc&xpb=1&gdpr=1&gdpr_consent=1&ru=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&vht=392&vwt=696&cp.schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.28.138.9 , Sweden, ASN197541 (VIDEOPLAZA-AS, SE),
Reverse DNS
Software
/
Resource Hash
20fb163cc9b1047707f9dabc4e9b267138aa8f426594ea29959c6d2c9c52bf03

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
content-encoding
gzip
status
200
vary
Origin, Accept-Encoding
content-type
text/xml;charset=utf-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
expires
Thu, 01 Jan 1970 00:00:00 GMT
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=err
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521401
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=err
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521401
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
v2
es-sunelespanol.videoplaza.tv/proxy/distributor/
59 KB
4 KB
XHR
General
Full URL
https://es-sunelespanol.videoplaza.tv/proxy/distributor/v2?s=RONIH/Desktop&tt=p&rt=vast_2.0&rnd=521495165&pf=fl_11&dcid=pc&xpb=1&gdpr=1&gdpr_consent=1&ru=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&vht=236&vwt=420&cp.schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.28.138.9 , Sweden, ASN197541 (VIDEOPLAZA-AS, SE),
Reverse DNS
Software
/
Resource Hash
8587877dcd8f1ed0923d4fa92802aecb98b7874d3452e0da9fd7508f010ec6fe

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
content-encoding
gzip
status
200
vary
Origin, Accept-Encoding
content-type
text/xml;charset=utf-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
expires
Thu, 01 Jan 1970 00:00:00 GMT
ima3vpaid
tpc.googlesyndication.com/
828 B
679 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=${randoml}&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fiu%3D%2F260217354%2Fmarca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26tfcd%3D0%26npa%3D0%26sz%3D300x250%257C320x180%257C320x240%257C540x360%257C640x360%257C640x480%257C720x576%257C768x576%257C1280x720%26gdfp_req%3D1%26output%3Dvast%26unviewed_position_start%3D1%26env%3Dvp%26vpos%3Dpreroll%26vpmute%3D0%26vpa%3D0%26type%3Djs%26nofb%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1667b318382d28a5d309727ccc58c7c8cd7b7fe61e862326486301de5c409a80
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
531
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 266E
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
age
1
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:11:54 GMT
ima3vpaid
tpc.googlesyndication.com/
828 B
606 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=${randoml}&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fiu%3D%2F260217354%2Fmarca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26tfcd%3D0%26npa%3D0%26sz%3D300x250%257C320x180%257C320x240%257C540x360%257C640x360%257C640x480%257C720x576%257C768x576%257C1280x720%26gdfp_req%3D1%26output%3Dvast%26unviewed_position_start%3D1%26env%3Dvp%26vpos%3Dpreroll%26vpmute%3D0%26vpa%3D0%26type%3Djs%26nofb%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1667b318382d28a5d309727ccc58c7c8cd7b7fe61e862326486301de5c409a80
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
531
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 1AC4
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
age
1
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:11:54 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 266E
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:55 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 1AC4
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:55 GMT
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.139.19 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:55 GMT
X-SMRT-D
6%3b8%3b109
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.139.19 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:56 GMT
X-SMRT-D
6%3b28%3b72
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.139.19 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:55 GMT
X-SMRT-D
6%3b27%3b123
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.139.19 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:55 GMT
X-SMRT-D
6%3b19%3b51
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.139.19 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:55 GMT
X-SMRT-D
6%3b21%3b89
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.139.19 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:55 GMT
X-SMRT-D
6%3b24%3b123
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

cygnus
as-sec.casalemedia.com/
25 B
988 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=311095&v=7.2&r=%7B%22id%22%3A%22154f1dfc9563b7c%22%2C%22imp%22%3A%5B%7B%22id%22%3A%2216f48da806abfa4%22%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311095%22%2C%22sid%22%3A%22970x250%22%7D%7D%2C%7B%22id%22%3A%2217361a031b1414f%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311095%22%2C%22sid%22%3A%22728x90%22%7D%7D%2C%7B%22id%22%3A%2219fdd19783fdc23%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311097%22%2C%22sid%22%3A%22300x600%22%7D%7D%2C%7B%22id%22%3A%2220fafc421a318b8%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311097%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%222161d8f6cdea41f%22%2C%22banner%22%3A%7B%22w%22%3A160%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311097%22%2C%22sid%22%3A%22160x600%22%7D%7D%2C%7B%22id%22%3A%22227fdf95c9f6d92%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311099%22%2C%22sid%22%3A%22300x600%22%7D%7D%2C%7B%22id%22%3A%2223713254de6a718%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311099%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%2224f2fac7f82e03%22%2C%22banner%22%3A%7B%22w%22%3A160%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311099%22%2C%22sid%22%3A%22160x600%22%7D%7D%2C%7B%22id%22%3A%2225f0e14ce6533c3%22%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311101%22%2C%22sid%22%3A%22970x250%22%7D%7D%2C%7B%22id%22%3A%2227a4450763f6ed5%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311101%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%2228b96939f0e653f%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311101%22%2C%22sid%22%3A%22728x90%22%7D%7D%2C%7B%22id%22%3A%222957b6029534657%22%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311103%22%2C%22sid%22%3A%22970x250%22%7D%7D%2C%7B%22id%22%3A%2231db30f028048bd%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311103%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%22325401cc2f6b9a%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311103%22%2C%22sid%22%3A%22728x90%22%7D%7D%2C%7B%22id%22%3A%2233a60e28527ea7b%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311105%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%2234e14b65c4b0a57%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311105%22%2C%22sid%22%3A%22728x90%22%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A0%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
71f668e553f4b382a47760237d5cd5277bf2eee461b8dcf1d8f4cd37f3385d80

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:56:56 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Tue, 21 Jan 2020 13:56:56 GMT
prebid
ib.adnxs.com/ut/v3/
729 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.215 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
315.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
e53e8f667fa1497f756cc8e7e7f574c9ee587d3cf25afb2e72335d46ef026847
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Date
Tue, 21 Jan 2020 13:56:57 GMT
Content-Encoding
gzip
Transfer-Encoding
chunked
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Connection
keep-alive
X-Proxy-Origin
82.102.19.132; 82.102.19.132; 315.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.139:80
X-XSS-Protection
0
Pragma
no-cache
AN-X-Request-Uuid
f342131f-c177-4eb5-a0f7-b88b9e9893b1
Server
nginx/1.13.4
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Expires
Sat, 15 Nov 2008 16:00:00 GMT
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
116.202.128.61 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.61.128.202.116.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
116.202.128.61 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.61.128.202.116.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
116.202.128.61 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.61.128.202.116.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
116.202.128.61 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.61.128.202.116.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
116.202.128.61 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.61.128.202.116.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
116.202.128.61 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.61.128.202.116.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame 78A6
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Tue, 21 Jan 2020 00:19:01 GMT
expires
Wed, 20 Jan 2021 00:19:01 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
49075
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 266E
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:56 GMT
integrator.js
adservice.google.com/adsid/ Frame 266E
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
truncated
/ Frame 266E
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 266E
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=21064573&id=ima_html5&c=2784531112533424&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:56 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame 1AC4
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame 7CE2
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Tue, 21 Jan 2020 00:19:01 GMT
expires
Wed, 20 Jan 2021 00:19:01 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
49075
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 1AC4
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:56 GMT
integrator.js
adservice.google.com/adsid/ Frame 1AC4
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 1AC4
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=651800007&id=ima_html5&c=3398908357846984&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:56 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3vpaid
tpc.googlesyndication.com/
779 B
578 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=-1513197521&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26vpos%3Dpreroll%26iu%3D%2F21631112852%2FRevenueMaker_Video%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3D0%26type%3Djs%26unviewed_position_start%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b8e940f70faaedc7fd9f351c65d428bab4440d3e7458ec5324f974b4f92d1357
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
500
x-xss-protection
0
ima3vpaid
tpc.googlesyndication.com/
800 B
597 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=256633512&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26vpos%3Dpreroll%26iu%3D%2F21631112852%2FRevenueMaker_Video%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3D0%26type%3Djs%26unviewed_position_start%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e078cb30da6385b9b3af7429d8cf21dbfc5b881b0c893b7e6dd28a716d853e3f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:56:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
518
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 1CD2
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:11:57 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 1CD2
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:57 GMT
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 5283
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp&correlator=256633512
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:11:57 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 5283
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp&correlator=256633512
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:57 GMT
truncated
/ Frame 1CD2
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame 95AF
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Tue, 21 Jan 2020 00:19:01 GMT
expires
Wed, 20 Jan 2021 00:19:01 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
49077
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 1CD2
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:58 GMT
integrator.js
adservice.google.com/adsid/ Frame 1CD2
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 1CD2
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=42530094&id=ima_html5&c=37595067839000&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:58 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame 5283
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame 5C9E
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Tue, 21 Jan 2020 00:19:01 GMT
expires
Wed, 20 Jan 2021 00:19:01 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
49077
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 5283
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:56:58 GMT
integrator.js
adservice.google.com/adsid/ Frame 5283
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 5283
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=21061786&id=ima_html5&c=3084326882564569&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:56:58 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
vast.sunmedia.tv/creatives/
1 KB
705 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
4b3b9b9f39fef6bd6e316aa19b37be467dd9e47cd53446279fde3cfc2d5067c1

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
267639
search.spotxchange.com/vast/2.0/
67 B
1 KB
XHR
General
Full URL
https://search.spotxchange.com/vast/2.0/267639?VPAID=JS&content_page_url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&cb=773314618&player_width=696&player_height=392&custom_skin=1&ad_volume=0&regs[gdpr]=1&user[consent]=1&schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
185.94.180.123 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
78e958d620d6e40a19e424eee3a9b23932cd9bfa4d7f736442048777d203052d

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:56:58 GMT
Content-Encoding
gzip
X-SpotX-Timing-Transform
0.000562
X-SpotX-Timing-SpotMarket
0.148565
X-SpotX-Timing-Page-Mux
0.000306
X-SpotX-Timing-Page-Require
0.000521
X-fe
070
Connection
keep-alive
X-SpotX-Timing-Page-Cookie
0.000039
Content-Length
76
X-SpotX-Timing-Page
0.154165
Pragma
no-cache
X-SpotX-Timing-Page-Context
0.000311
Last-Modified
Tue, 21 Jan 2020 13:56:58 GMT
Server
nginx
Cache-Control
no-cache, must-revalidate, post-check=0, pre-check=0
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Vary
Accept-Encoding
X-SpotX-Timing-SpotMarket-Primary
0.075735
Content-Type
text/xml;charset=UTF-8
Access-Control-Allow-Origin
https://www.genbeta.com
X-SpotX-Timing-Page-Misc
0.003847
X-SpotX-Timing-Page-Exception
0.000001
X-SpotX-Timing-SpotMarket-Secondary
0.072830
X-SpotX-Timing-Page-URI
0.000013
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Expires
Thu, 01 Jan 1970 00:00:00 GMT
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js
creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/ Frame F638
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
80b5eb4754c78a4295cab91ff51c2cb2cca1ee0de677aea9e92dee7a95aff95e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Tue, 14 Jan 2020 12:37:24 GMT
server
nginx
age
600926
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35887
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
vast.sunmedia.tv/creatives/
1 KB
705 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
4b3b9b9f39fef6bd6e316aa19b37be467dd9e47cd53446279fde3cfc2d5067c1

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js
creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/ Frame 7E89
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
80b5eb4754c78a4295cab91ff51c2cb2cca1ee0de677aea9e92dee7a95aff95e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:58 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Tue, 14 Jan 2020 12:37:24 GMT
server
nginx
age
600926
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35887
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame C770
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
531450
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
hb_zhb_generico-caro.js
creatives.sunmedia.tv/vpaid_ssp_display/hb/ Frame C770
5 KB
2 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
52935733acbfaa83126cdf4a3cc3ba730eaa8903b9be74b1a8dbf2eaed1bf9ac

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
content-type
application/x-javascript
status
200
cache-control
no-cache
access-control-allow-credentials
true, true
x-device
desktop
/
track.sunmedia.tv/ Frame F638
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=SMAdFactory
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521405
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame F638
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=adl
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521405
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ec.sascdn.com/tag/1999/ Frame C770
24 KB
10 KB
Script
General
Full URL
https://ec.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.16 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBF) /
Resource Hash
2b75150e90ce1ab05e462c1f9fa3be1b9bf46eb8ca01ace5385ed860ea84c7e2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
content-encoding
gzip
last-modified
Tue, 21 Jan 2020 13:53:06 GMT
server
ECS (amb/6BBF)
age
233
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript; charset=utf-8
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
10130
expires
Tue, 21 Jan 2020 14:01:59 GMT
prebid.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame C770
277 KB
88 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
c8a22161e476569199308a717b2d6e775ddd7d50770f7236df3400fcea193317

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
1292
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
89279
accept-ranges
bytes
x-device
desktop
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame E122
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
531450
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
hb_zhb_generico-caro.js
creatives.sunmedia.tv/vpaid_ssp_display/hb/ Frame E122
5 KB
2 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
52935733acbfaa83126cdf4a3cc3ba730eaa8903b9be74b1a8dbf2eaed1bf9ac

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
content-type
application/x-javascript
status
200
cache-control
no-cache
access-control-allow-credentials
true, true
x-device
desktop
/
track.sunmedia.tv/ Frame 7E89
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=SMAdFactory
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521405
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 7E89
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=adl
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521405
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ec.sascdn.com/tag/1999/ Frame E122
24 KB
10 KB
Script
General
Full URL
https://ec.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.16 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBF) /
Resource Hash
2b75150e90ce1ab05e462c1f9fa3be1b9bf46eb8ca01ace5385ed860ea84c7e2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
content-encoding
gzip
last-modified
Tue, 21 Jan 2020 13:53:06 GMT
server
ECS (amb/6BBF)
age
233
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript; charset=utf-8
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
10130
expires
Tue, 21 Jan 2020 14:01:59 GMT
prebid.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame E122
277 KB
88 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
c8a22161e476569199308a717b2d6e775ddd7d50770f7236df3400fcea193317

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:59 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
1293
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
89279
accept-ranges
bytes
x-device
desktop
v1
prebid.digitru.st/id/ Frame C770
425 B
1 KB
XHR
General
Full URL
https://prebid.digitru.st/id/v1
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:b200:a:d79f:3100:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
2f27a7cda08967d0fd272ba5d8e8457b1c7e71bc8ac735ffc016c96fa968a97f

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:01 GMT
via
1.1 b74a7a3f7ddfd685212e870d027c332d.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA53
status
200
vary
Accept-Encoding, Origin
access-control-allow-methods
GET, OPTIONS
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
https://www.genbeta.com
cache-control
private, max-age=15552000
access-control-allow-credentials
true
x-cache
LambdaGeneratedResponse from cloudfront
content-type
application/json
content-length
425
x-amz-cf-id
5BXns2FgSaYdOrtrRiIdn7bCn97Uz_FC4ttQvwe2785q8yw7dJ5_aA==
/
track.sunmedia.tv/ Frame F638
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=vw
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:01 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
5521407
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
v1
prebid.digitru.st/id/ Frame E122
425 B
1 KB
XHR
General
Full URL
https://prebid.digitru.st/id/v1
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:b200:a:d79f:3100:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
5f2034fd7f35eb4ff3aa7bb668fcccf7ebb102587e34d4716df285d767ac1946

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:01 GMT
via
1.1 b74a7a3f7ddfd685212e870d027c332d.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA53
status
200
vary
Accept-Encoding, Origin
access-control-allow-methods
GET, OPTIONS
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
https://www.genbeta.com
cache-control
private, max-age=15552000
access-control-allow-credentials
true
x-cache
LambdaGeneratedResponse from cloudfront
content-type
application/json
content-length
425
x-amz-cf-id
MyiRR_UickJPAQ_AgbfqdtralQouuvK1UQlZ-O246rFdUlPfzJfveg==

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652558&size_id=2&alt_size_ids=57&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=1f8efd45-2ee4-473c-a620-0776d67b160b&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.29584924314854666
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652562&size_id=15&alt_size_ids=9%2C10&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=32320de1-c338-4bcf-b0c7-4ffa9317f224&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.8524487355403321
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652566&size_id=15&alt_size_ids=9%2C10&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=9a1b22f2-1889-43d3-b7f1-7e8c882a199b&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.7425371629950674
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652570&size_id=15&alt_size_ids=2%2C57&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=6cd70226-2fb4-4874-80b5-fafb6d09e629&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.9395614362653493
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652574&size_id=15&alt_size_ids=2%2C57&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=7562fe32-4b8c-4ec0-9146-18d38e9ca307&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.17040746149364439
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652578&size_id=15&alt_size_ids=2&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=43512d39-6b8f-408c-8ae0-4dfc5e1f30d3&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.9429334599930157

Verdicts & Comments Add Verdict or Comment

171 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate string| country boolean| isSpainOrLatamUser object| googletag object| dataLayer boolean| gdprAppliesGlobally function| refreshAds function| handleClick function| agreeAllOnce function| setUpDidomi function| __cmp object| didomiConfig object| didomiOnReady object| WSL number| PREBID_TIMEOUT object| adUnits object| pbjs object| apstagSlots object| bidders object| requestManager function| _getGPTSlots function| allBiddersBack function| headerBidderBack function| sendAdserverRequest function| requestBids object| apstag string| didomiCountry object| didomiGeoRegulations function| pbjsChunk object| __core-js_shared__ function| JSEncrypt object| __cmpBuffer object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken boolean| apstagLOADED string| GoogleAnalyticsObject function| __gaTracker object| _comscore object| configs string| keyword function| udm_ object| ns_p object| COMSCORE object| WSLModules object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| __twttrll object| twttr object| __twttr object| AML object| Didomi function| webpackJsonpDidomi object| core function| setImmediate function| clearImmediate object| didomiEventListeners object| adsbygoogle object| didomiState number| google_srt undefined| google_measure_js_timing number| __google_ad_urls_id object| WSL2 object| webpackJsonpjwplayer function| jwplayer number| ConsentforGoogleIs function| jQuery function| $ object| Modernizr object| picturefillCFG function| picturefill function| moment function| _ object| Backbone object| FB object| ExposeTranslation function| WSLCookie function| FuckAdBlock object| fuckAdBlock function| forEach function| detect object| ui string| uAgent object| smdevice string| smuAgent number| SMGDPRKey object| SMIntextPlaylist object| adblockDetector number| google_unique_id function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb boolean| testIframe string| raiEnvIP string| raiEnvUA string| raiEnvCountry string| raiEnvDevice string| raiEnvRef string| raiEnvRefDomain string| raiEnvRandom string| raiCntCSS string| raiCntJS string| hasConsent string| raiCertID string| raiOOPPid0pk1yTLOmb object| SMInHome number| rmsSkinSize function| pnetInitSkin object| raiTag function| raiResizeGen object| currentScript string| currentProtocol boolean| isOpera boolean| isFirefox boolean| isSafari boolean| isIE boolean| isEdge boolean| isChrome string| raiTagCmpErrorText object| raiTagCmpError object| scriptSplit object| raiTargetWindow object| raiTargetWindowDocument string| csyncPubConsent string| csyncEuConsent string| csyncHasConsent string| raProtocol object| raiHITag string| raHISrc string| url number| sm_conscore_rnda number| sm_conscore_rndb string| raEuconsent string| raReferrer object| agkn function| setUpAgknTag object| SMIntext_1579615009120 function| agknTagBuilder object| _agknTag string| _agknTagName object| _agknEchoTag number| _isAgknTagSet object| SMExtraPlgs number| checkSMcontainerWL function| removeSMcontainerWL object| SMcontainerWL object| SMCurrentPlayer string| f number| g string| raConsentString string| raReferrerDomain string| raHasConsent object| raIfSync number| google_global_correlator object| closure_lm_4918 object| closure_lm_486014 object| closure_lm_195496 object| closure_lm_983743

0 Cookies

1 Console Messages

Source Level URL
Text
console-api warning URL: https://img.weblogssl.com/LPbackend/prod/v2/js/postpage-cdeb2da9.js(Line 1)
Message:
The Facebook JSSDK is more than 7 days old.

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

aax-eu.amazon-adsystem.com
ab.blogs.es
adserver.video
adservice.google.be
adservice.google.com
adservice.google.de
as-sec.casalemedia.com
c.amazon-adsystem.com
cdn.syndication.twimg.com
ced.sascdn.com
connect.facebook.net
creatives.sunmedia.tv
d.agkn.com
ec.sascdn.com
es-sunelespanol.videoplaza.tv
fastlane.rubiconproject.com
feeds.weblogssl.com
fonts.googleapis.com
graph.facebook.com
i.blogs.es
i0.wp.com
ib.adnxs.com
imasdk.googleapis.com
img.weblogssl.com
img.youtube.com
js.agkn.com
pagead2.googlesyndication.com
pbs.twimg.com
platform-lookaside.fbsbx.com
platform.sunmedia.tv
platform.twitter.com
prebid.digitru.st
prg.smartadserver.com
recommendations.weblogssl.com
rosetta.richmediastudio.com
s.richaudience.com
s0.2mdn.net
sb.scorecardresearch.com
sdk-gcp.privacy-center.org
sdk.privacy-center.org
search.spotxchange.com
securepubads.g.doubleclick.net
services.sunmedia.tv
shb.richaudience.com
static.sunmedia.tv
staticxx.facebook.com
stats.g.doubleclick.net
sync.richaudience.com
syndication.twitter.com
t.richaudience.com
ti.blogs.es
tpc.googlesyndication.com
track.sunmedia.tv
vast.sunmedia.tv
www.facebook.com
www.genbeta.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagservices.com
www.gravatar.com
www8.smartadserver.com
fastlane.rubiconproject.com
104.244.42.136
116.202.128.61
159.69.76.252
178.33.230.6
185.28.138.9
185.33.223.215
185.86.137.43
185.86.139.19
185.94.180.123
192.0.77.2
2.16.186.113
2001:4860:4802:32::75
216.58.207.66
23.210.249.164
23.45.99.242
2600:1901:0:7dde::
2600:9000:2047:2c00:15:efbc:e300:93a1
2600:9000:2047:3a00:16:9f91:2d80:93a1
2600:9000:2047:3e00:19:fc2c:a140:93a1
2600:9000:2047:6600:5:b7cc:d3c0:93a1
2600:9000:2047:b200:a:d79f:3100:93a1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:59:254c:406:2366:268c
2a00:1450:4001:800::2001
2a00:1450:4001:800::2002
2a00:1450:4001:806::200a
2a00:1450:4001:809::200a
2a00:1450:4001:809::200e
2a00:1450:4001:81a::200e
2a00:1450:4001:81e::2013
2a00:1450:4001:821::2006
2a00:1450:4001:824::2002
2a00:1450:4001:824::2003
2a00:1450:400c:c0c::9a
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f02d:e:face:b00c:0:2
2a03:2880:f12d:83:face:b00c:0:25de
2a04:fa87:fffe::c000:4902
51.91.154.17
52.222.153.194
52.222.155.122
52.222.155.226
52.222.155.24
52.222.155.38
52.222.155.67
52.31.221.208
52.94.218.7
68.232.35.16
92.222.198.105
94.130.242.230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