URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Submission: On June 09 via manual from PH

Summary

This website contacted 17 IPs in 2 countries across 15 domains to perform 75 HTTP transactions. The main IP is 172.217.23.147, located in Mountain View, United States and belongs to GOOGLE - Google LLC, US. The main domain is www.effecthacking.com.
This is the only time www.effecthacking.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
7 172.217.23.147 15169 (GOOGLE)
1 9 216.58.207.73 15169 (GOOGLE)
20 172.217.22.2 15169 (GOOGLE)
1 173.194.76.82 15169 (GOOGLE)
1 216.58.207.74 15169 (GOOGLE)
2 209.197.3.15 20446 (HIGHWINDS3)
1 172.217.22.42 15169 (GOOGLE)
17 216.58.207.65 15169 (GOOGLE)
1 216.58.208.41 15169 (GOOGLE)
3 216.58.208.33 15169 (GOOGLE)
5 172.217.23.142 15169 (GOOGLE)
1 2 216.58.207.78 15169 (GOOGLE)
2 216.58.207.67 15169 (GOOGLE)
1 74.125.71.156 15169 (GOOGLE)
1 2 216.58.208.45 15169 (GOOGLE)
1 185.60.216.38 32934 (FACEBOOK)
3 185.60.216.19 32934 (FACEBOOK)
75 17
Domain Requested by
11 pagead2.googlesyndication.com www.effecthacking.com
pagead2.googlesyndication.com
9 www.blogger.com 1 redirects www.effecthacking.com
www.blogger.com
apis.google.com
7 googleads.g.doubleclick.net pagead2.googlesyndication.com
7 3.bp.blogspot.com www.effecthacking.com
7 1.bp.blogspot.com www.effecthacking.com
7 www.effecthacking.com www.effecthacking.com
ajax.googleapis.com
www.blogger.com
5 apis.google.com www.effecthacking.com
apis.google.com
3 4.bp.blogspot.com www.effecthacking.com
3 2.bp.blogspot.com www.effecthacking.com
2 staticxx.facebook.com connect.facebook.net
2 accounts.google.com 1 redirects apis.google.com
2 fonts.gstatic.com www.effecthacking.com
2 www.google-analytics.com 1 redirects www.effecthacking.com
2 maxcdn.bootstrapcdn.com www.effecthacking.com
1 connect.facebook.net www.effecthacking.com
1 www.facebook.com www.effecthacking.com
1 stats.g.doubleclick.net www.effecthacking.com
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 resources.blogblog.com www.effecthacking.com
1 ajax.googleapis.com www.effecthacking.com
1 fonts.googleapis.com www.effecthacking.com
1 netoopscodes.googlecode.com www.effecthacking.com
75 23
Subject Issuer Validity Valid
*.g.doubleclick.net
Google Internet Authority G3
2018-05-23 -
2018-08-15
3 months crt.sh
*.blogger.com
Google Internet Authority G3
2018-05-23 -
2018-08-15
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2017-12-15 -
2019-03-22
a year crt.sh
*.apis.google.com
Google Internet Authority G3
2018-05-23 -
2018-08-15
3 months crt.sh
accounts.google.com
Google Internet Authority G3
2018-05-23 -
2018-08-15
3 months crt.sh

This page contains 21 frames:

Primary Page: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Frame ID: 07BF0D11405305785E0F2548BDB4455D
Requests: 55 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20180606/r20180604/zrt_lookup.html
Frame ID: BB7DD21DFAD855F86AA982BF9E2F4460
Requests: 1 HTTP requests in this frame

Frame: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Frame ID: A3BFD27E6B3D05A24245410271936833
Requests: 1 HTTP requests in this frame

Frame: https://www.blogger.com/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288&bpli=1
Frame ID: 94A9CBF34DDD1199F45BBA31C60EED3E
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2Feffecthacking%2F&tabs=timeline&width=340&height=350&small_header=false&adapt_container_width=true&hide_cover=false&show_facepile=true&appId=1520518184865671
Frame ID: 61B2BEEDABD338D016B367BA80E38ADC
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=90&slotname=4727887905&adk=718910715&adf=1300654006&w=728&fwrn=4&fwrnh=100&lmt=1528582092&rafmt=1&npa=1&guci=1.2.0.0.2.1.0&format=728x90&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0006&fwr=0&rh=0&rw=728&resp_fmts=3&wgl=1&adsid=NT&dt=1528583299180&bpp=17&bdt=89&fdt=20&idt=183&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&correlator=1883445929353&frm=20&pv=2&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=8923810&dssz=25&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=614&ady=67&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=7&ifi=1&xpc=3j5iMZCLkZ&p=http%3A//www.effecthacking.com&dtd=212
Frame ID: E278A621FEF8B593969310E615184077
Requests: 1 HTTP requests in this frame

Frame: https://apis.google.com/_/widget/render/page?usegapi=1&href=https%3A%2F%2Fplus.google.com%2F113206963633510795444&layout=portrait&rel=author&showcoverphoto=true&showtagline=true&theme=dark&width=350&hl=en&origin=http%3A%2F%2Fwww.effecthacking.com&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
Frame ID: F85641691E5EFF1D2EEB1A6A36F4DE2F
Requests: 1 HTTP requests in this frame

Frame: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Frame ID: 6CB32E1923436D9790E4743256823859
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=60&slotname=9632121105&adk=4239280819&adf=4195138827&w=468&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&wgl=1&adsid=NT&dt=1528583299224&bpp=17&bdt=133&fdt=326&idt=328&shv=r20180606&cbv=r20180604&saldr=sa&abxe=1&prev_fmts=728x90&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=373&ady=376&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeE%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=2&xpc=bTWmcu7OsK&p=http%3A//www.effecthacking.com&dtd=364
Frame ID: 3E97EC04A0EB580F11B8B4C7775EAB4B
Requests: 1 HTTP requests in this frame

Frame: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Frame ID: E0B615738C49AE0F539B8B2E21095F98
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=250&slotname=7271055106&adk=1434762101&adf=2656754135&w=300&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&format=300x250&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&avail_w=300&wgl=1&adsid=NT&dt=1528583299242&bpp=10&bdt=151&fdt=411&idt=414&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90&prev_slotnames=9632121105&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=457&ady=3176&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=3&xpc=weRteOpbEq&p=http%3A//www.effecthacking.com&dtd=420
Frame ID: F04D91B618E57C8AE1162DFFE38F04B8
Requests: 1 HTTP requests in this frame

Frame: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Frame ID: 8786274D49E5D95AC3DF2376B69246F3
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=280&slotname=9020316701&adk=1157581842&adf=2573975828&w=336&fwrn=4&fwrnh=100&lmt=1528582092&rafmt=1&npa=1&guci=1.2.0.0.2.1.0&format=336x280&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0001&fwr=0&rh=0&rw=336&resp_fmts=3&wgl=1&adsid=NT&dt=1528583299332&bpp=9&bdt=241&fdt=384&idt=385&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90%2C300x250&prev_slotnames=9632121105&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1006&ady=271&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpeoE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=7&ifi=4&xpc=0cNCyYg80F&p=http%3A//www.effecthacking.com&dtd=397
Frame ID: 90A54EAF5B78B7F25EF042E61CC42730
Requests: 1 HTTP requests in this frame

Frame: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Frame ID: 439BD26F137C7BDAC35658C624C3A965
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=600&slotname=8880715901&adk=1232427434&adf=2423644460&w=300&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0001&wgl=1&adsid=NT&dt=1528583299399&bpp=9&bdt=308&fdt=370&idt=373&shv=r20180606&cbv=r20180604&saldr=sa&abxe=1&prev_fmts=728x90%2C300x250%2C336x280&prev_slotnames=9632121105&correlator=1883445929353&pv_h_ch=L0001&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1006&ady=2048&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=5&xpc=EJucLwIoxf&p=http%3A//www.effecthacking.com&dtd=386
Frame ID: F891E0F2295F1C01C278BA99CA73C177
Requests: 1 HTTP requests in this frame

Frame: https://accounts.google.com/o/oauth2/postmessageRelay?parent=http%3A%2F%2Fwww.effecthacking.com&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
Frame ID: 171918FF55CC17F6C40D807943A3511B
Requests: 1 HTTP requests in this frame

Frame: https://www.blogger.com/navbar.g?targetBlogID=5477678119341908769&blogName=Effect++Hacking&publishMode=PUBLISH_MODE_HOSTED&navbarType=LIGHT&layoutType=LAYOUTS&searchRoot=http://www.effecthacking.com/search&blogLocale=en&v=2&homepageUrl=http://www.effecthacking.com/&targetPostID=8308753457548451516&blogPostOrPageUrl=http://www.effecthacking.com/2018/06/windows-exploit-suggester.html&vt=1750245299205092187&usegapi=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
Frame ID: 5DE84F0B66F516C132CA559F9A4DCF77
Requests: 1 HTTP requests in this frame

Frame: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Frame ID: 5B0D4E4D0031C9E59E0C60E4DA2F39F0
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&adk=1812271804&adf=3025194257&lmt=1528582092&plat=1%3A32776%2C2%3A16809992%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C26%3A32768%2C30%3A1081344&npa=1&guci=1.2.0.0.2.1.0&format=0x0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1528583299332&bpp=161&bdt=242&fdt=529&idt=531&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90%2C300x250%2C336x280&prev_slotnames=9632121105%2C8880715901&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=0&ady=0&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=2&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cpnr%7C&abl=CS&ppjl=u&fu=16&bc=7&ifi=5&dtd=546
Frame ID: 401A640A7720DECEC024525FC7E73A67
Requests: 1 HTTP requests in this frame

Frame: http://staticxx.facebook.com/connect/xd_arbiter/r/mAiQUwlReIP.js?version=42
Frame ID: BD3A030BAD1DE156320DCDA6722341DA
Requests: 1 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter/r/mAiQUwlReIP.js?version=42
Frame ID: AC8FABF2F1008E70C640510842097E5F
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • meta generator /^Blogger$/i

Overall confidence: 100%
Detected patterns
  • headers server /GSE/i

Overall confidence: 100%
Detected patterns
  • headers server /GSE/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\/pagead\/show_ads\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

75
Requests

17 %
HTTPS

0 %
IPv6

15
Domains

23
Subdomains

17
IPs

2
Countries

3810 kB
Transfer

6378 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 32
  • https://www.google-analytics.com/r/collect?v=1&_v=j68&a=1755637002&t=pageview&_s=1&dl=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&ul=en-us&de=UTF-8&dt=Windows%20Exploit%20Suggester%20-%20Tool%20To%20Detect%20Potential%20Missing%20Patches%20%26%20Find%20Exploits%20-%20Effect%20Hacking&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAEAB~&jid=1662567706&gjid=1816328996&cid=269349537.1528583299&tid=UA-53574279-1&_gid=1921511622.1528583299&_r=1&z=1185883898 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-53574279-1&cid=269349537.1528583299&jid=1662567706&_gid=1921511622.1528583299&gjid=1816328996&_v=j68&z=1185883898
Request Chain 33
  • https://www.blogger.com/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288 HTTP 302
  • https://accounts.google.com/ServiceLogin?continue=https://www.blogger.com/comment-iframe.g?blogID%3D5477678119341908769%26postID%3D8308753457548451516%26blogspotRpcToken%3D5492288%26bpli%3D1&followup=https://www.blogger.com/comment-iframe.g?blogID%3D5477678119341908769%26postID%3D8308753457548451516%26blogspotRpcToken%3D5492288%26bpli%3D1&passive=true&go=true HTTP 302
  • https://www.blogger.com/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288&bpli=1
Request Chain 43
  • http://connect.facebook.net/pt_BR/sdk.js HTTP 307
  • https://connect.facebook.net/pt_BR/sdk.js

75 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request windows-exploit-suggester.html
www.effecthacking.com/2018/06/
187 KB
36 KB
Document
General
Full URL
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
172.217.23.147 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f147.1e100.net
Software
GSE /
Resource Hash
62cc1396743d95e524559bcf19c767bfe171fe53c7dade4e0c8ba19e22a7897c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
www.effecthacking.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D

Response headers

Content-Type
text/html; charset=UTF-8
Expires
Sat, 09 Jun 2018 22:28:19 GMT
Date
Sat, 09 Jun 2018 22:28:19 GMT
Cache-Control
private, max-age=0
Last-Modified
Sat, 09 Jun 2018 22:08:12 GMT
ETag
W/"5c013c479746363efa70070b4083fd3e4227402ce83cc673df48c5397094db12"
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Length
36022
Server
GSE
2437439463-css_bundle_v2.css
www.blogger.com/static/v1/widgets/
41 KB
9 KB
Stylesheet
General
Full URL
https://www.blogger.com/static/v1/widgets/2437439463-css_bundle_v2.css
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
sffe /
Resource Hash
9ab222347578ca0ec423daad8b0e694c643f51809cb96646c55cf630d586055f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Fri, 18 May 2018 20:42:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 18 May 2018 08:30:05 GMT
server
sffe
age
1907142
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
9140
x-xss-protection
1; mode=block
expires
Sat, 18 May 2019 20:42:37 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
72 KB
27 KB
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
95a8e5dd1deb430f39b4c0bfda688349c733e3c595d61d068980e72263b775af
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Timing-Allow-Origin
*
Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
cafe
ETag
9733605541171003686
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=3600
Content-Disposition
attachment; filename="f.txt"
Content-Type
text/javascript; charset=UTF-8
Content-Length
27056
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
auto-readmore-blogger.js
netoopscodes.googlecode.com/svn/branches/Js%20files/
0
0
Script
General
Full URL
http://netoopscodes.googlecode.com/svn/branches/Js%20files/auto-readmore-blogger.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
173.194.76.82 Portage, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
ws-in-f82.1e100.net
Software
/
Resource Hash

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Content-Type
text/html; charset=UTF-8
css
fonts.googleapis.com/
496 B
612 B
Stylesheet
General
Full URL
http://fonts.googleapis.com/css?family=Montserrat:400,700
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
216.58.207.74 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f10.1e100.net
Software
ESF /
Resource Hash
f865b691fa029713f237ec5547ac007928c5ae2aa4698eb3a6c5578fe5d9d65e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
Server
ESF
X-Frame-Options
SAMEORIGIN
Content-Type
text/css; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=86400
Transfer-Encoding
chunked
Timing-Allow-Origin
*
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.6.1/css/
28 KB
7 KB
Stylesheet
General
Full URL
http://maxcdn.bootstrapcdn.com/font-awesome/4.6.1/css/font-awesome.min.css
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
209.197.3.15 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip0x00f.map2.ssl.hwcdn.net
Software
/
Resource Hash
b5d7707ea8fc00aae40bf500ac7498d7f32f6b1bbff7b4fde976a40345eb5f9d

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
Last-Modified
Sat, 17 Feb 2018 21:46:17 GMT
Connection
Keep-Alive
ETag
"1518903977"
Vary
Accept-Encoding
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
X-Hello-Human
Say hello back! @getBootstrapCDN on Twitter
Accept-Ranges
bytes
Content-Length
6591
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.12.2/
95 KB
34 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.12.2/jquery.min.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
172.217.22.42 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s16-in-f10.1e100.net
Software
sffe /
Resource Hash
95914789b5f3307a3718679e867d61b9d4c03f749cd2e2970570331d7d6c8ed9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Mon, 12 Feb 2018 19:54:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
10118038
status
200
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
34009
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 12 Feb 2019 19:54:21 GMT
LOGO-4.png
1.bp.blogspot.com/-z25fwy6SYMM/WG-nr84wwJI/AAAAAAAAI-M/bMeCnH-KgaEuGjIlESVGg-vXqn18mCwrQCK4B/s1600/
6 KB
6 KB
Image
General
Full URL
http://1.bp.blogspot.com/-z25fwy6SYMM/WG-nr84wwJI/AAAAAAAAI-M/bMeCnH-KgaEuGjIlESVGg-vXqn18mCwrQCK4B/s1600/LOGO-4.png
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
7dce5793d26f56e652608f82de5a4df8d6102d138f924a6c261d6896b70bf561
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:01:43 GMT
X-Content-Type-Options
nosniff
Server
fife
Age
1596
ETag
"v23e4"
Vary
Origin
Content-Type
image/png
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length
Cache-Control
public, max-age=86400, no-transform
Content-Disposition
inline;filename="LOGO-4.png"
Timing-Allow-Origin
*
Content-Length
5649
X-XSS-Protection
1; mode=block
Expires
Fri, 08 Jun 2018 07:07:00 GMT
icon18_wrench_allbkg.png
resources.blogblog.com/img/
475 B
716 B
Image
General
Full URL
https://resources.blogblog.com/img/icon18_wrench_allbkg.png
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.208.41 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f41.1e100.net
Software
sffe /
Resource Hash
d172d750493be64a7ed84dec1dd2a0d787ba42f78bc694b0858f152c52b6620b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Mon, 04 Jun 2018 19:29:56 GMT
x-content-type-options
nosniff
last-modified
Mon, 04 Jun 2018 17:39:35 GMT
server
sffe
age
442703
content-type
image/png
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
475
x-xss-protection
1; mode=block
expires
Mon, 11 Jun 2018 19:29:56 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/
52 KB
20 KB
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
252ebac3063fcbd9bc22949fb95cb3289e0110d89b96fab7d712d187d3c13331
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Timing-Allow-Origin
*
Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
cafe
ETag
1143505128079438140
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=3600
Content-Disposition
attachment; filename="f.txt"
Content-Type
text/javascript; charset=UTF-8
Content-Length
20005
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
Windows%2BExploit%2BSuggester.jpg
1.bp.blogspot.com/-EejdP73bQdU/WxunlrDXonI/AAAAAAAAMtQ/FteEL5nbKkoyN183qvJ1LzF2rzMULNt4ACLcBGAs/s1600/
157 KB
157 KB
Image
General
Full URL
https://1.bp.blogspot.com/-EejdP73bQdU/WxunlrDXonI/AAAAAAAAMtQ/FteEL5nbKkoyN183qvJ1LzF2rzMULNt4ACLcBGAs/s1600/Windows%2BExploit%2BSuggester.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
f9b08cc67fd40704abddb4574e68238a909e8346c7d8efd49677ca094e2dcbb1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:47 GMT
x-content-type-options
nosniff
age
1592
status
200
content-disposition
inline;filename="Windows Exploit Suggester.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
160579
x-xss-protection
1; mode=block
server
fife
etag
"v32d5"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sun, 10 Jun 2018 15:04:48 GMT
2567313873-comment_from_post_iframe.js
www.blogger.com/static/v1/jsbin/
11 KB
4 KB
Script
General
Full URL
https://www.blogger.com/static/v1/jsbin/2567313873-comment_from_post_iframe.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
sffe /
Resource Hash
c4c1b7760c095804a679a51b4c7f7d6138d6db722c4210976b1e9381f0e07ce0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Thu, 24 May 2018 17:32:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 24 May 2018 10:35:31 GMT
server
sffe
age
1400152
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
4392
x-xss-protection
1; mode=block
expires
Fri, 24 May 2019 17:32:27 GMT
how%2Bto%2Bbypass%2Bsms%2Bverification.jpg
2.bp.blogspot.com/-fIQrW_j8iOc/VbUSb77y1nI/AAAAAAAAFls/jrI1NK9k1zM/s72-c/
2 KB
2 KB
Image
General
Full URL
https://2.bp.blogspot.com/-fIQrW_j8iOc/VbUSb77y1nI/AAAAAAAAFls/jrI1NK9k1zM/s72-c/how%2Bto%2Bbypass%2Bsms%2Bverification.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
a78b4e3aa87245cb3d259b8f0e7a213196ac24e5b0d1b6296bfd76fcd8264151
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:47 GMT
x-content-type-options
nosniff
age
1592
status
200
content-disposition
inline;filename="how to bypass sms verification.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
1986
x-xss-protection
1; mode=block
server
fife
etag
"v165c"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Fri, 08 Jun 2018 05:15:55 GMT
DroidSQLi-Hackers-Android-App.jpg
4.bp.blogspot.com/-dKnXqieeQcc/VnkOFX1YzSI/AAAAAAAAGyY/px_Nl8E-dd4/s72-c/
3 KB
3 KB
Image
General
Full URL
https://4.bp.blogspot.com/-dKnXqieeQcc/VnkOFX1YzSI/AAAAAAAAGyY/px_Nl8E-dd4/s72-c/DroidSQLi-Hackers-Android-App.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.208.33 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f1.1e100.net
Software
fife /
Resource Hash
41c8581d8f579fd226b4122b2129ad00a950b8c65380e2ec8c40adddd1161c07
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:28:19 GMT
x-content-type-options
nosniff
age
0
status
200
content-disposition
inline;filename="DroidSQLi-Hackers-Android-App.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
3251
x-xss-protection
1; mode=block
server
fife
etag
"v1b27"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 09:38:22 GMT
DroidSheep%2BTool%2B-%2BAndroid%2BApp.jpg
3.bp.blogspot.com/-SKNn13EayUs/VStvNgleu3I/AAAAAAAADns/Latlslzqc_k/s72-c/
4 KB
4 KB
Image
General
Full URL
https://3.bp.blogspot.com/-SKNn13EayUs/VStvNgleu3I/AAAAAAAADns/Latlslzqc_k/s72-c/DroidSheep%2BTool%2B-%2BAndroid%2BApp.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
24a9de1d83e75b72942a1b7d4ed5567016bb77bba6fef05b00ebc9c46b3125e3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:45 GMT
x-content-type-options
nosniff
age
1594
status
200
content-disposition
inline;filename="DroidSheep Tool - Android App.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
3943
x-xss-protection
1; mode=block
server
fife
etag
"ve7c"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:02:48 GMT
dSploit_hackers_android_tool.jpg
3.bp.blogspot.com/-J-Xh_FapMAc/WgBk7bl5i5I/AAAAAAAALGQ/CIRNylOsOm83jp-09xlsN7VVBKrp7aH1ACLcBGAs/s72-c/
2 KB
3 KB
Image
General
Full URL
https://3.bp.blogspot.com/-J-Xh_FapMAc/WgBk7bl5i5I/AAAAAAAALGQ/CIRNylOsOm83jp-09xlsN7VVBKrp7aH1ACLcBGAs/s72-c/dSploit_hackers_android_tool.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
ebe2f09090a7482bb5e2d7f8349d09f9124a8c2bda578ff52fbc21993c9a488a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:45 GMT
x-content-type-options
nosniff
age
1594
status
200
content-disposition
inline;filename="dSploit_hackers_android_tool.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
2512
x-xss-protection
1; mode=block
server
fife
etag
"v2c65"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:02:48 GMT
best%2BIP%2Bhide%2Btools%2B2018.jpg
1.bp.blogspot.com/-BKvYpXFUI20/WnqbPgCpGBI/AAAAAAAAMJE/hGsYlcbeFmMbB3Wzr8oaeMXbIJbmz1WpwCLcBGAs/s72-c/
3 KB
3 KB
Image
General
Full URL
https://1.bp.blogspot.com/-BKvYpXFUI20/WnqbPgCpGBI/AAAAAAAAMJE/hGsYlcbeFmMbB3Wzr8oaeMXbIJbmz1WpwCLcBGAs/s72-c/best%2BIP%2Bhide%2Btools%2B2018.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
11c7da04ababda42b2d010d0f4eaf8f62772c1057157329261986e6f12cf31c6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:46 GMT
x-content-type-options
nosniff
age
1593
status
200
content-disposition
inline;filename="best IP hide tools 2018.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
2733
x-xss-protection
1; mode=block
server
fife
etag
"v3092"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:02:48 GMT
WIBR-Android-App-Hackers.jpg
3.bp.blogspot.com/-7ImCpeKO_BI/VuHPOZTEipI/AAAAAAAAHJE/ER-xvDQ-U601HJjM1Wuqhz4uk3q8kMe0g/s72-c/
4 KB
4 KB
Image
General
Full URL
https://3.bp.blogspot.com/-7ImCpeKO_BI/VuHPOZTEipI/AAAAAAAAHJE/ER-xvDQ-U601HJjM1Wuqhz4uk3q8kMe0g/s72-c/WIBR-Android-App-Hackers.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
db8fffd7cf440ede14d615edb0b2e0fdb5d1c8b0471dca3206a8c7fbf82cacf1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:46 GMT
x-content-type-options
nosniff
age
1593
status
200
content-disposition
inline;filename="WIBR-Android-App-Hackers.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
4195
x-xss-protection
1; mode=block
server
fife
etag
"v1c92"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:02:48 GMT
i2p-Hackers-Android-App.jpg
1.bp.blogspot.com/-Pu78Mml2i2U/VnHIS8J6_RI/AAAAAAAAGx4/ZoMJnjPxyhU/s72-c/
4 KB
4 KB
Image
General
Full URL
https://1.bp.blogspot.com/-Pu78Mml2i2U/VnHIS8J6_RI/AAAAAAAAGx4/ZoMJnjPxyhU/s72-c/i2p-Hackers-Android-App.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
29d87e19df7e2feb60607d59ddc0f5cd2e90001ee9da38f010ab4dcb3799dcc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:46 GMT
x-content-type-options
nosniff
age
1593
status
200
content-disposition
inline;filename="i2p-Hackers-Android-App.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
3616
x-xss-protection
1; mode=block
server
fife
etag
"v1b1f"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:02:48 GMT
plusone.js
apis.google.com/js/
43 KB
17 KB
Script
General
Full URL
https://apis.google.com/js/plusone.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
172.217.23.142 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f14.1e100.net
Software
ESF /
Resource Hash
e8231877de0f767620885ff6967761fdd4897da4283a2110b1d202cb6333a532
Security Headers
Name Value
Content-Security-Policy script-src 'unsafe-inline' 'unsafe-eval' 'self' https://*.gstatic.com https://www.google-analytics.com https://pagead2.googleadservices.com https://pagead2.googlesyndication.com https://tpc.googlesyndication.com https://s.ytimg.com https://www.youtube.com;report-uri /_/cspreport/es_oz_20180606.12_p0
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

content-security-policy
script-src 'unsafe-inline' 'unsafe-eval' 'self' https://*.gstatic.com https://www.google-analytics.com https://pagead2.googleadservices.com https://pagead2.googlesyndication.com https://tpc.googlesyndication.com https://s.ytimg.com https://www.youtube.com;report-uri /_/cspreport/es_oz_20180606.12_p0
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="This is not a P3P policy! See g.co/p3phelp for more info."
status
200
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, chrome=1
server
ESF
x-frame-options
SAMEORIGIN
date
Sat, 09 Jun 2018 22:28:19 GMT
strict-transport-security
max-age=31536000
content-type
application/javascript; charset=utf-8
cache-control
private, max-age=1800, stale-while-revalidate=1800
etag
"93781cc992e5d29228e5f0ba188f1ca0"
timing-allow-origin
*
expires
Sat, 09 Jun 2018 22:28:19 GMT
analytics.js
www.google-analytics.com/
34 KB
14 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.78 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f14.1e100.net
Software
Golfe2 /
Resource Hash
3fab1c883847e4b5a02f3749a9f4d9eab15cd4765873d3b2904a1a4c8755fba3
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 18 May 2018 01:10:24 GMT
server
Golfe2
age
6314
date
Sat, 09 Jun 2018 20:43:05 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
14386
expires
Sat, 09 Jun 2018 22:43:05 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.effecthacking.com
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
SPDY
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 09 Jun 2018 22:28:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.effecthacking.com
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
SPDY
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 09 Jun 2018 22:28:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
104
x-xss-protection
1; mode=block
cookienotice.js
www.effecthacking.com/js/
6 KB
2 KB
Script
General
Full URL
http://www.effecthacking.com/js/cookienotice.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
172.217.23.147 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f147.1e100.net
Software
sffe /
Resource Hash
068ffe90977f2b5b2dc2ef18572166e85281bd0ecb31c4902464b23db54d2568
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.effecthacking.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 08 Jun 2018 10:15:32 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Fri, 08 Jun 2018 09:49:21 GMT
Server
sffe
Age
130367
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
public, max-age=604800
Accept-Ranges
bytes
Content-Length
2026
X-XSS-Protection
1; mode=block
Expires
Fri, 15 Jun 2018 10:15:32 GMT
476324606-widgets.js
www.blogger.com/static/v1/widgets/
145 KB
52 KB
Script
General
Full URL
https://www.blogger.com/static/v1/widgets/476324606-widgets.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
sffe /
Resource Hash
8e40a297047f43a672140d747c446f75cbeb62ca16898ab2a3a7fc88842566d1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 05 Jun 2018 00:35:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 04 Jun 2018 19:29:01 GMT
server
sffe
age
424358
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
53264
x-xss-protection
1; mode=block
expires
Wed, 05 Jun 2019 00:35:41 GMT
authorization.css
www.blogger.com/dyn-css/
1 B
638 B
Stylesheet
General
Full URL
https://www.blogger.com/dyn-css/authorization.css?targetBlogID=5477678119341908769&zx=cb27229a-6ee3-40c9-9e1b-36421c037c82
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
GSE /
Resource Hash
01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
Security Headers
Name Value
Content-Security-Policy script-src 'self' *.google.com *.google-analytics.com 'unsafe-inline' 'unsafe-eval' *.gstatic.com *.googlesyndication.com *.blogger.com *.googleapis.com uds.googleusercontent.com https://s.ytimg.com https://i18n-cloud.appspot.com www-onepick-opensocial.googleusercontent.com www-bloggervideo-opensocial.googleusercontent.com www-blogger-opensocial.googleusercontent.com https://www.blogblog.com; report-uri /cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

content-security-policy
script-src 'self' *.google.com *.google-analytics.com 'unsafe-inline' 'unsafe-eval' *.gstatic.com *.googlesyndication.com *.blogger.com *.googleapis.com uds.googleusercontent.com https://s.ytimg.com https://i18n-cloud.appspot.com www-onepick-opensocial.googleusercontent.com www-bloggervideo-opensocial.googleusercontent.com www-blogger-opensocial.googleusercontent.com https://www.blogblog.com; report-uri /cspreport
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="This is not a P3P policy! See https://www.google.com/support/accounts/bin/answer.py?hl=en&answer=151657 for more info."
status
200
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
21
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 Jun 2018 22:28:19 GMT
server
GSE
date
Sat, 09 Jun 2018 22:28:19 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=UTF-8
cache-control
private, max-age=1800
expires
Sat, 09 Jun 2018 22:28:19 GMT
windows-exploit-suggester.html
www.effecthacking.com/2018/06/
64 KB
64 KB
Image
General
Full URL
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
172.217.23.147 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f147.1e100.net
Software
GSE /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.effecthacking.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sat, 09 Jun 2018 22:08:12 GMT
Server
GSE
ETag
W/"5c013c479746363efa70070b4083fd3e4227402ce83cc673df48c5397094db12"
Content-Type
text/html; charset=UTF-8
Cache-Control
private, max-age=0
Content-Length
36022
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
JTURjIg1_i6t8kCHKm45_dJE3gnD-w.ttf
fonts.gstatic.com/s/montserrat/v12/
45 KB
24 KB
Font
General
Full URL
http://fonts.gstatic.com/s/montserrat/v12/JTURjIg1_i6t8kCHKm45_dJE3gnD-w.ttf
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
216.58.207.67 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f3.1e100.net
Software
sffe /
Resource Hash
7efbd86cc7b38ff4073967d7ec290934fc421eb2ed25ed3ec1592d79826e610c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Montserrat:400,700
Origin
http://www.effecthacking.com

Response headers

Date
Mon, 12 Feb 2018 17:55:51 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 07 Nov 2017 15:27:06 GMT
Server
sffe
Age
10125148
Vary
Accept-Encoding
Content-Type
font/ttf
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
23885
X-XSS-Protection
1; mode=block
Expires
Tue, 12 Feb 2019 17:55:51 GMT
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.6.1/fonts/
69 KB
70 KB
Font
General
Full URL
http://maxcdn.bootstrapcdn.com/font-awesome/4.6.1/fonts/fontawesome-webfont.woff2?v=4.6.1
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
209.197.3.15 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip0x00f.map2.ssl.hwcdn.net
Software
/
Resource Hash
d3ebb498192527b985939ae62cc4e5eb5c108efc1896184126b45d866868e73d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
http://maxcdn.bootstrapcdn.com/font-awesome/4.6.1/css/font-awesome.min.css
Origin
http://www.effecthacking.com

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
Last-Modified
Sat, 17 Feb 2018 21:46:23 GMT
Connection
Keep-Alive
ETag
"1518903983"
Vary
Accept-Encoding
X-Cache
HIT
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
X-Hello-Human
Say hello back! @getBootstrapCDN on Twitter
Accept-Ranges
bytes
Content-Length
70769
JTUSjIg1_i6t8kCHKm459Wlhzg.ttf
fonts.gstatic.com/s/montserrat/v12/
44 KB
23 KB
Font
General
Full URL
http://fonts.gstatic.com/s/montserrat/v12/JTUSjIg1_i6t8kCHKm459Wlhzg.ttf
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
216.58.207.67 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f3.1e100.net
Software
sffe /
Resource Hash
66dc995d8af6f17d9e3931e5de51ef935684a6cbf609a2284d723292676802c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Montserrat:400,700
Origin
http://www.effecthacking.com

Response headers

Date
Thu, 24 May 2018 16:21:07 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 07 Nov 2017 15:24:32 GMT
Server
sffe
Age
1404432
Vary
Accept-Encoding
Content-Type
font/ttf
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
23546
X-XSS-Protection
1; mode=block
Expires
Fri, 24 May 2019 16:21:07 GMT
ca-pub-8611754734716313.js
pagead2.googlesyndication.com/pub-config/r20160913/
133 B
236 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-8611754734716313.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
SPDY
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
sffe /
Resource Hash
ad3f5743027d58f0c5e8b2f074edc3fb50e776ddecdb8a90531fd30407d6ff48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 14:29:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 08 Jun 2018 21:20:23 GMT
server
sffe
age
28718
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=43200
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
125
x-xss-protection
1; mode=block
expires
Sun, 10 Jun 2018 02:29:41 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20180606/r20180604/ Frame BB7D
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20180606/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20180606/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Wed, 06 Jun 2018 14:46:42 GMT
expires
Wed, 20 Jun 2018 14:46:42 GMT
content-type
text/html; charset=UTF-8
etag
8341461738443483577
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6979
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
286897
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/ Frame A3BF
185 KB
69 KB
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
c486d301e3e01ccc5ed592c93b1f64858230171d77d249bcc43f55114e4afdd8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Timing-Allow-Origin
*
Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
cafe
ETag
958556953946447520
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=1209600
Content-Disposition
attachment; filename="f.txt"
Content-Type
text/javascript; charset=UTF-8
Content-Length
70460
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j68&a=1755637002&t=pageview&_s=1&dl=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&ul=en-us&de=UTF-8&dt=Wi...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-53574279-1&cid=269349537.1528583299&jid=1662567706&_gid=1921511622.1528583299&gjid=1816328996&_v=j68&z=1185883898
35 B
136 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-53574279-1&cid=269349537.1528583299&jid=1662567706&_gid=1921511622.1528583299&gjid=1816328996&_v=j68&z=1185883898
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
74.125.71.156 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
wn-in-f156.1e100.net
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Sat, 09 Jun 2018 22:28:19 GMT
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 09 Jun 2018 22:28:19 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
302
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-53574279-1&cid=269349537.1528583299&jid=1662567706&_gid=1921511622.1528583299&gjid=1816328996&_v=j68&z=1185883898
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
419
expires
Fri, 01 Jan 1990 00:00:00 GMT
comment-iframe.g
www.blogger.com/ Frame 94A9
Redirect Chain
  • https://www.blogger.com/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288
  • https://accounts.google.com/ServiceLogin?continue=https://www.blogger.com/comment-iframe.g?blogID%3D5477678119341908769%26postID%3D8308753457548451516%26blogspotRpcToken%3D5492288%26bpli%3D1&follow...
  • https://www.blogger.com/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288&bpli=1
0
0
Document
General
Full URL
https://www.blogger.com/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288&bpli=1
Requested by
Host: www.blogger.com
URL: https://www.blogger.com/static/v1/jsbin/2567313873-comment_from_post_iframe.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'self' *.google.com *.google-analytics.com 'unsafe-inline' 'unsafe-eval' *.gstatic.com *.googlesyndication.com *.blogger.com *.googleapis.com uds.googleusercontent.com https://s.ytimg.com https://i18n-cloud.appspot.com www-onepick-opensocial.googleusercontent.com www-bloggervideo-opensocial.googleusercontent.com www-blogger-opensocial.googleusercontent.com https://www.blogblog.com; report-uri /cspreport
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.blogger.com
:scheme
https
:path
/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288&bpli=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
CP="This is not a P3P policy! See https://www.google.com/support/accounts/bin/answer.py?hl=en&answer=151657 for more info."
content-security-policy
script-src 'self' *.google.com *.google-analytics.com 'unsafe-inline' 'unsafe-eval' *.gstatic.com *.googlesyndication.com *.blogger.com *.googleapis.com uds.googleusercontent.com https://s.ytimg.com https://i18n-cloud.appspot.com www-onepick-opensocial.googleusercontent.com www-bloggervideo-opensocial.googleusercontent.com www-blogger-opensocial.googleusercontent.com https://www.blogblog.com; report-uri /cspreport
content-type
text/html; charset=UTF-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 09 Jun 2018 22:28:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1802
server
GSE
set-cookie
S=blogger=HnvjmLnjs2yxpWCzbSbvKqClrCRhzPwM; Domain=.blogger.com; Path=/; Secure; HttpOnly; Priority=LOW
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"

Redirect headers

status
302
content-type
text/html; charset=UTF-8
x-frame-options
DENY
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 09 Jun 2018 22:28:19 GMT
location
https://www.blogger.com/comment-iframe.g?blogID=5477678119341908769&postID=8308753457548451516&blogspotRpcToken=5492288&bpli=1
strict-transport-security
max-age=31536000; includeSubDomains
content-security-policy
script-src 'report-sample' 'nonce-4NBDVzljsVVJrCubH2Kw+4btz4I' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri /cspreport
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
257
server
GSE
set-cookie
GAPS=1:EXPSVuRnCq5Q3iElHjJcKKTaDktI0g:mozWhSN-QnP7DpNO;Path=/;Expires=Mon, 08-Jun-2020 22:28:19 GMT;Secure;HttpOnly;Priority=HIGH
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
page.php
www.facebook.com/plugins/ Frame 61B2
0
0
Document
General
Full URL
https://www.facebook.com/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2Feffecthacking%2F&tabs=timeline&width=340&height=350&small_header=false&adapt_container_width=true&hide_cover=false&show_facepile=true&appId=1520518184865671
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.60.216.38 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2Feffecthacking%2F&tabs=timeline&width=340&height=350&small_header=false&adapt_container_width=true&hide_cover=false&show_facepile=true&appId=1520518184865671
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
timing-allow-origin
*
x-xss-protection
0
pragma
no-cache
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
cache-control
private, no-cache, no-store, must-revalidate
expect-ct
max-age=10, report-uri="http://reports.fb.com/expectct/"
strict-transport-security
max-age=15552000; preload
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html; charset=UTF-8
x-fb-debug
xd07S1RYvW1KMJykS8FfvKZhRmo3MOL/4ZFXiOX2M7SK6hsCPZtC/apbhE0tuRRGdAFDbS0PTtf7cbDZ0ByBeg==
date
Sat, 09 Jun 2018 22:28:19 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame E278
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=90&slotname=4727887905&adk=718910715&adf=1300654006&w=728&fwrn=4&fwrnh=100&lmt=1528582092&rafmt=1&npa=1&guci=1.2.0.0.2.1.0&format=728x90&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0006&fwr=0&rh=0&rw=728&resp_fmts=3&wgl=1&adsid=NT&dt=1528583299180&bpp=17&bdt=89&fdt=20&idt=183&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&correlator=1883445929353&frm=20&pv=2&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=8923810&dssz=25&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=614&ady=67&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=7&ifi=1&xpc=3j5iMZCLkZ&p=http%3A//www.effecthacking.com&dtd=212
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8611754734716313&output=html&h=90&slotname=4727887905&adk=718910715&adf=1300654006&w=728&fwrn=4&fwrnh=100&lmt=1528582092&rafmt=1&npa=1&guci=1.2.0.0.2.1.0&format=728x90&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0006&fwr=0&rh=0&rw=728&resp_fmts=3&wgl=1&adsid=NT&dt=1528583299180&bpp=17&bdt=89&fdt=20&idt=183&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&correlator=1883445929353&frm=20&pv=2&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=8923810&dssz=25&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=614&ady=67&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=7&ifi=1&xpc=3j5iMZCLkZ&p=http%3A//www.effecthacking.com&dtd=212
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Sat, 09 Jun 2018 22:28:19 GMT
server
cafe
cache-control
private
content-length
42174
x-xss-protection
1; mode=block
set-cookie
test_cookie=CheckForPermission; expires=Sat, 09-Jun-2018 22:43:19 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
expires
Sat, 09 Jun 2018 22:28:19 GMT
osd.js
pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/
71 KB
26 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Protocol
SPDY
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
a390cf62fca4217670690ed84dcb7f8d569348f6ef9ef61b3ea4bc15c4548561
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 06 Jun 2018 14:50:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
286673
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
26505
x-xss-protection
1; mode=block
server
cafe
etag
18183909933677749988
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 20 Jun 2018 14:50:26 GMT
cb=gapi.loaded_0
apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/
131 KB
46 KB
Script
General
Full URL
https://apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/cb=gapi.loaded_0
Requested by
Host: apis.google.com
URL: https://apis.google.com/js/plusone.js
Protocol
SPDY
Server
172.217.23.142 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f14.1e100.net
Software
sffe /
Resource Hash
fccf51e5a89cfae6e766442d94184ab23f2ab6d7953d987e00d1bd073e05af95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 06 Jun 2018 23:09:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 06 Jun 2018 19:50:46 GMT
server
sffe
age
256744
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
47073
x-xss-protection
1; mode=block
expires
Thu, 06 Jun 2019 23:09:15 GMT
cb=gapi.loaded_1
apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=auth/exm=page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/
98 KB
34 KB
Script
General
Full URL
https://apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=auth/exm=page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/cb=gapi.loaded_1
Requested by
Host: apis.google.com
URL: https://apis.google.com/js/plusone.js
Protocol
SPDY
Server
172.217.23.142 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f14.1e100.net
Software
sffe /
Resource Hash
dd7124b9436ca3a4cad4b88f8eeb9e42696d69d11d6f810725e1ea1820b95924
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 06 Jun 2018 23:09:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 06 Jun 2018 19:50:46 GMT
server
sffe
age
256744
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
35111
x-xss-protection
1; mode=block
expires
Thu, 06 Jun 2019 23:09:15 GMT
page
apis.google.com/_/widget/render/ Frame F856
0
0
Document
General
Full URL
https://apis.google.com/_/widget/render/page?usegapi=1&href=https%3A%2F%2Fplus.google.com%2F113206963633510795444&layout=portrait&rel=author&showcoverphoto=true&showtagline=true&theme=dark&width=350&hl=en&origin=http%3A%2F%2Fwww.effecthacking.com&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
Requested by
Host: apis.google.com
URL: https://apis.google.com/js/plusone.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.217.23.142 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f14.1e100.net
Software
ESF /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'unsafe-inline' 'unsafe-eval' 'self' https://*.gstatic.com https://www.google-analytics.com https://pagead2.googleadservices.com https://pagead2.googlesyndication.com https://tpc.googlesyndication.com https://s.ytimg.com https://www.youtube.com;report-uri /_/cspreport/es_oz_20180606.12_p0
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
apis.google.com
:scheme
https
:path
/_/widget/render/page?usegapi=1&href=https%3A%2F%2Fplus.google.com%2F113206963633510795444&layout=portrait&rel=author&showcoverphoto=true&showtagline=true&theme=dark&width=350&hl=en&origin=http%3A%2F%2Fwww.effecthacking.com&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
cookie
NID=132=0cdC2GJPzKsG_sUamuroRRK09RnoxdGd7K078APW55LnAhGr7TMmxOGkNcSySoKwWdjNGOFMkPhGb9xuAlbVHG-j3UQi5g09zfXIhKz5UlCE3jhCqXngWxhLaYBqfJ0O
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
content-type
text/html; charset=utf-8
content-security-policy
script-src 'unsafe-inline' 'unsafe-eval' 'self' https://*.gstatic.com https://www.google-analytics.com https://pagead2.googleadservices.com https://pagead2.googlesyndication.com https://tpc.googlesyndication.com https://s.ytimg.com https://www.youtube.com;report-uri /_/cspreport/es_oz_20180606.12_p0
x-ua-compatible
IE=edge, chrome=1
vary
Accept-Encoding
timing-allow-origin
*
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 09 Jun 2018 22:28:19 GMT
content-encoding
gzip
server
ESF
x-xss-protection
1; mode=block
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
cb=gapi.loaded_2
apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=gapi_iframes,gapi_iframes_style_bubble/exm=auth,page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/
33 KB
11 KB
Script
General
Full URL
https://apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=gapi_iframes,gapi_iframes_style_bubble/exm=auth,page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/cb=gapi.loaded_2
Requested by
Host: apis.google.com
URL: https://apis.google.com/js/plusone.js
Protocol
SPDY
Server
172.217.23.142 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f14.1e100.net
Software
sffe /
Resource Hash
e49e9b2cbc32dcf5da1912c348d0e35fa0c719feb2aa87a3ddf731efc89b880d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 06 Jun 2018 23:57:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 06 Jun 2018 19:50:46 GMT
server
sffe
age
253839
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
10895
x-xss-protection
1; mode=block
expires
Thu, 06 Jun 2019 23:57:40 GMT
google_top_exp.js
pagead2.googlesyndication.com/pagead/js/
47 B
627 B
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/google_top_exp.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
ccecd185ac16ba0a538840f37701053fbb861f7fbbdd86039c7415fcd924d1f2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Timing-Allow-Origin
*
Date
Mon, 04 Jun 2018 14:39:46 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
cafe
Age
460113
ETag
13036835877489095579
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
public, max-age=1209600
Content-Disposition
attachment; filename="f.txt"
Content-Type
text/javascript; charset=UTF-8
Content-Length
67
X-XSS-Protection
1; mode=block
Expires
Mon, 18 Jun 2018 14:39:46 GMT
Windows-Hacking-Tool
www.effecthacking.com/feeds/posts/default/-/
61 KB
12 KB
XHR
General
Full URL
http://www.effecthacking.com/feeds/posts/default/-/Windows-Hacking-Tool?alt=json-in-script&max-results=3&callback=jQuery1122030376721453231137_1528583299161&_=1528583299162
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.2/jquery.min.js
Protocol
HTTP/1.1
Server
172.217.23.147 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f147.1e100.net
Software
blogger-renderd /
Resource Hash
97dbf173d12fa6ab3f132cba210c9bf94838704502b53a4a67205d0c669ebf63
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.effecthacking.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
X-Requested-With
XMLHttpRequest
Cookie
_ga=GA1.2.269349537.1528583299; _gid=GA1.2.1921511622.1528583299; _gat_blogger=1
Connection
keep-alive
Cache-Control
no-cache
Accept
text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sat, 09 Jun 2018 22:08:12 GMT
Server
blogger-renderd
ETag
W/"26a7d4bce9fc610e10a2b691bf1287a7901f2cd7d247736f287cb269a61b0a59"
X-Frame-Options
SAMEORIGIN
Content-Type
text/javascript; charset=UTF-8
Cache-Control
public, must-revalidate, proxy-revalidate, max-age=1
Content-Length
12070
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:20 GMT
sdk.js
connect.facebook.net/pt_BR/
Redirect Chain
  • http://connect.facebook.net/pt_BR/sdk.js
  • https://connect.facebook.net/pt_BR/sdk.js
212 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/pt_BR/sdk.js
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
4dee4aecad23c898cc56c97b59e211ee1ed63fa1ff665ff150b3ee3fc6f493ff
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
Ntcu52HkD4YAimjSvh4zZQ==
status
200
content-length
65206
x-xss-protection
0
x-fb-debug
u9wrSGRiFf+kbqmhE9G8wzK4UwRlgLSOOCBrs1NpgJGw9QZymXKMqUsrGLQsWra6xpaKild0A3KobxeHe6ZEog==
x-fb-content-md5
e1061f1bff8629ef0c0b0437677d2e4f
x-frame-options
DENY
date
Sat, 09 Jun 2018 22:28:19 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
etag
"1f30beeac5fd12646698893acb122089"
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
timing-allow-origin
*
expires
Sat, 09 Jun 2018 22:31:59 GMT

Redirect headers

Location
https://connect.facebook.net/pt_BR/sdk.js#xfbml=1&version=v2.5
Non-Authoritative-Reason
HSTS
windows-exploit-suggester.html
www.effecthacking.com/2018/06/
504 B
696 B
XHR
General
Full URL
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?action=backlinks&widgetId=Blog1&widgetType=Blog&responseType=js&postID=8308753457548451516&xssi_token=AOuZoY50FmDhsLtKnWaDHukYWFd_zvbvug%3A1528583298856
Requested by
Host: www.blogger.com
URL: https://www.blogger.com/static/v1/widgets/476324606-widgets.js
Protocol
HTTP/1.1
Server
172.217.23.147 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f147.1e100.net
Software
GSE /
Resource Hash
223a1318b2e4e435100565d9c01849d188d0d52a1a08c28b329cb69b79542cce
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.effecthacking.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Cookie
_ga=GA1.2.269349537.1528583299; _gid=GA1.2.1921511622.1528583299; _gat_blogger=1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sat, 09 Jun 2018 22:08:12 GMT
Server
GSE
ETag
"cb27229a-6ee3-40c9-9e1b-36421c037c82"
Content-Type
text/javascript; charset=UTF-8
Cache-Control
private, max-age=0
Content-Length
303
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
windows-exploit-suggester.html
www.effecthacking.com/2018/06/
187 KB
36 KB
XHR
General
Full URL
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.2/jquery.min.js
Protocol
HTTP/1.1
Server
172.217.23.147 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f147.1e100.net
Software
GSE /
Resource Hash
62cc1396743d95e524559bcf19c767bfe171fe53c7dade4e0c8ba19e22a7897c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.effecthacking.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html, */*; q=0.01
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
X-Requested-With
XMLHttpRequest
Cookie
_ga=GA1.2.269349537.1528583299; _gid=GA1.2.1921511622.1528583299; _gat_blogger=1
Connection
keep-alive
Cache-Control
no-cache
Accept
text/html, */*; q=0.01
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sat, 09 Jun 2018 22:08:12 GMT
Server
GSE
ETag
W/"5c013c479746363efa70070b4083fd3e4227402ce83cc673df48c5397094db12"
Content-Type
text/html; charset=UTF-8
Cache-Control
private, max-age=0
Content-Length
36022
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
p0wnedshell.html
www.effecthacking.com/2018/06/
183 KB
35 KB
XHR
General
Full URL
http://www.effecthacking.com/2018/06/p0wnedshell.html
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.12.2/jquery.min.js
Protocol
HTTP/1.1
Server
172.217.23.147 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f147.1e100.net
Software
GSE /
Resource Hash
9f530039cddbedee4357c5f02a8f199ea35fcc83a8dbaa6ccdbef206dd1ce791
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.effecthacking.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html, */*; q=0.01
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
X-Requested-With
XMLHttpRequest
Cookie
_ga=GA1.2.269349537.1528583299; _gid=GA1.2.1921511622.1528583299; _gat_blogger=1
Connection
keep-alive
Cache-Control
no-cache
Accept
text/html, */*; q=0.01
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sat, 09 Jun 2018 22:08:12 GMT
Server
GSE
ETag
W/"5c013c479746363efa70070b4083fd3e4227402ce83cc673df48c5397094db12"
Content-Type
text/html; charset=UTF-8
Cache-Control
private, max-age=0
Content-Length
35791
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
how%2Bto%2Bbypass%2Bsms%2Bverification.jpg
2.bp.blogspot.com/-fIQrW_j8iOc/VbUSb77y1nI/AAAAAAAAFls/jrI1NK9k1zM/s1600/
118 KB
118 KB
Image
General
Full URL
https://2.bp.blogspot.com/-fIQrW_j8iOc/VbUSb77y1nI/AAAAAAAAFls/jrI1NK9k1zM/s1600/how%2Bto%2Bbypass%2Bsms%2Bverification.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
de25acdd2b6a59503283ff5a137d1283f7f7e1da821b1c78adc6cf11027d330a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:48 GMT
x-content-type-options
nosniff
age
1591
status
200
content-disposition
inline;filename="how to bypass sms verification.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
120731
x-xss-protection
1; mode=block
server
fife
etag
"v165c"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Fri, 08 Jun 2018 05:15:56 GMT
DroidSQLi-Hackers-Android-App.jpg
4.bp.blogspot.com/-dKnXqieeQcc/VnkOFX1YzSI/AAAAAAAAGyY/px_Nl8E-dd4/s1600/
164 KB
164 KB
Image
General
Full URL
https://4.bp.blogspot.com/-dKnXqieeQcc/VnkOFX1YzSI/AAAAAAAAGyY/px_Nl8E-dd4/s1600/DroidSQLi-Hackers-Android-App.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.208.33 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f1.1e100.net
Software
fife /
Resource Hash
5b050deeb851ebc36511e7633b21dc15deef4fefe2be3229cd1802a287985f23
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:28:19 GMT
x-content-type-options
nosniff
age
0
status
200
content-disposition
inline;filename="DroidSQLi-Hackers-Android-App.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
168159
x-xss-protection
1; mode=block
server
fife
etag
"v1b27"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Wed, 06 Jun 2018 15:44:24 GMT
DroidSheep%2BTool%2B-%2BAndroid%2BApp.jpg
3.bp.blogspot.com/-SKNn13EayUs/VStvNgleu3I/AAAAAAAADns/Latlslzqc_k/s1600/
75 KB
75 KB
Image
General
Full URL
https://3.bp.blogspot.com/-SKNn13EayUs/VStvNgleu3I/AAAAAAAADns/Latlslzqc_k/s1600/DroidSheep%2BTool%2B-%2BAndroid%2BApp.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
0e01889ff14cc32ec52e55e321370ad87e8dd77ef7f5ef5bbac42481d7d80402
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:48 GMT
x-content-type-options
nosniff
age
1591
status
200
content-disposition
inline;filename="DroidSheep Tool - Android App.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
76625
x-xss-protection
1; mode=block
server
fife
etag
"ve7c"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Wed, 06 Jun 2018 05:48:47 GMT
dSploit_hackers_android_tool.jpg
3.bp.blogspot.com/-J-Xh_FapMAc/WgBk7bl5i5I/AAAAAAAALGQ/CIRNylOsOm83jp-09xlsN7VVBKrp7aH1ACLcBGAs/s1600/
456 KB
456 KB
Image
General
Full URL
https://3.bp.blogspot.com/-J-Xh_FapMAc/WgBk7bl5i5I/AAAAAAAALGQ/CIRNylOsOm83jp-09xlsN7VVBKrp7aH1ACLcBGAs/s1600/dSploit_hackers_android_tool.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
015bccd63a574af0e11ff55a87419669e115a2bc4f2ced6cbbbd450fb8928f75
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:48 GMT
x-content-type-options
nosniff
age
1591
status
200
content-disposition
inline;filename="dSploit_hackers_android_tool.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
466853
x-xss-protection
1; mode=block
server
fife
etag
"v2c65"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:03:35 GMT
best%2BIP%2Bhide%2Btools%2B2018.jpg
1.bp.blogspot.com/-BKvYpXFUI20/WnqbPgCpGBI/AAAAAAAAMJE/hGsYlcbeFmMbB3Wzr8oaeMXbIJbmz1WpwCLcBGAs/s1600/
397 KB
398 KB
Image
General
Full URL
https://1.bp.blogspot.com/-BKvYpXFUI20/WnqbPgCpGBI/AAAAAAAAMJE/hGsYlcbeFmMbB3Wzr8oaeMXbIJbmz1WpwCLcBGAs/s1600/best%2BIP%2Bhide%2Btools%2B2018.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
7a28178f673adcd9fc1c31e335e91cbccdb9729c12c6cc311957cc32821425ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:50 GMT
x-content-type-options
nosniff
age
1589
status
200
content-disposition
inline;filename="best IP hide tools 2018.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
406943
x-xss-protection
1; mode=block
server
fife
etag
"v3092"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:03:49 GMT
WIBR-Android-App-Hackers.jpg
3.bp.blogspot.com/-7ImCpeKO_BI/VuHPOZTEipI/AAAAAAAAHJE/ER-xvDQ-U601HJjM1Wuqhz4uk3q8kMe0g/s1600/
171 KB
171 KB
Image
General
Full URL
https://3.bp.blogspot.com/-7ImCpeKO_BI/VuHPOZTEipI/AAAAAAAAHJE/ER-xvDQ-U601HJjM1Wuqhz4uk3q8kMe0g/s1600/WIBR-Android-App-Hackers.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
44d589bbff79745dc092337c25c77816ca78767b8d5aeb2179c1157895eec2b2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:50 GMT
x-content-type-options
nosniff
age
1589
status
200
content-disposition
inline;filename="WIBR-Android-App-Hackers.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
175098
x-xss-protection
1; mode=block
server
fife
etag
"v1c92"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:03:49 GMT
i2p-Hackers-Android-App.jpg
1.bp.blogspot.com/-Pu78Mml2i2U/VnHIS8J6_RI/AAAAAAAAGx4/ZoMJnjPxyhU/s1600/
207 KB
208 KB
Image
General
Full URL
https://1.bp.blogspot.com/-Pu78Mml2i2U/VnHIS8J6_RI/AAAAAAAAGx4/ZoMJnjPxyhU/s1600/i2p-Hackers-Android-App.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
7982f32394d732dcaf580d9be8ad50b81b48547c0c850e2039fc06de5801f351
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:50 GMT
x-content-type-options
nosniff
age
1589
status
200
content-disposition
inline;filename="i2p-Hackers-Android-App.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
212308
x-xss-protection
1; mode=block
server
fife
etag
"v1b1f"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 23:03:49 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/ Frame 6CB3
185 KB
0
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
c486d301e3e01ccc5ed592c93b1f64858230171d77d249bcc43f55114e4afdd8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Content-Type
text/javascript; charset=UTF-8
Server
cafe
ETag
958556953946447520
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=1209600
Content-Disposition
attachment; filename="f.txt"
Timing-Allow-Origin
*
Content-Length
70460
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 3E97
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=60&slotname=9632121105&adk=4239280819&adf=4195138827&w=468&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&wgl=1&adsid=NT&dt=1528583299224&bpp=17&bdt=133&fdt=326&idt=328&shv=r20180606&cbv=r20180604&saldr=sa&abxe=1&prev_fmts=728x90&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=373&ady=376&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeE%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=2&xpc=bTWmcu7OsK&p=http%3A//www.effecthacking.com&dtd=364
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8611754734716313&output=html&h=60&slotname=9632121105&adk=4239280819&adf=4195138827&w=468&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&wgl=1&adsid=NT&dt=1528583299224&bpp=17&bdt=133&fdt=326&idt=328&shv=r20180606&cbv=r20180604&saldr=sa&abxe=1&prev_fmts=728x90&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=373&ady=376&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeE%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=2&xpc=bTWmcu7OsK&p=http%3A//www.effecthacking.com&dtd=364
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Sat, 09 Jun 2018 22:28:19 GMT
server
cafe
cache-control
private
content-length
16900
x-xss-protection
1; mode=block
set-cookie
test_cookie=CheckForPermission; expires=Sat, 09-Jun-2018 22:43:19 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
expires
Sat, 09 Jun 2018 22:28:19 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/ Frame E0B6
185 KB
0
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
c486d301e3e01ccc5ed592c93b1f64858230171d77d249bcc43f55114e4afdd8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Content-Type
text/javascript; charset=UTF-8
Server
cafe
ETag
958556953946447520
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=1209600
Content-Disposition
attachment; filename="f.txt"
Timing-Allow-Origin
*
Content-Length
70460
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame F04D
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=250&slotname=7271055106&adk=1434762101&adf=2656754135&w=300&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&format=300x250&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&avail_w=300&wgl=1&adsid=NT&dt=1528583299242&bpp=10&bdt=151&fdt=411&idt=414&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90&prev_slotnames=9632121105&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=457&ady=3176&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=3&xpc=weRteOpbEq&p=http%3A//www.effecthacking.com&dtd=420
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8611754734716313&output=html&h=250&slotname=7271055106&adk=1434762101&adf=2656754135&w=300&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&format=300x250&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&avail_w=300&wgl=1&adsid=NT&dt=1528583299242&bpp=10&bdt=151&fdt=411&idt=414&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90&prev_slotnames=9632121105&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=457&ady=3176&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=3&xpc=weRteOpbEq&p=http%3A//www.effecthacking.com&dtd=420
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Sat, 09 Jun 2018 22:28:19 GMT
server
cafe
cache-control
private
content-length
15176
x-xss-protection
1; mode=block
set-cookie
test_cookie=CheckForPermission; expires=Sat, 09-Jun-2018 22:43:19 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
expires
Sat, 09 Jun 2018 22:28:19 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/ Frame 8786
185 KB
0
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
c486d301e3e01ccc5ed592c93b1f64858230171d77d249bcc43f55114e4afdd8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Content-Type
text/javascript; charset=UTF-8
Server
cafe
ETag
958556953946447520
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=1209600
Content-Disposition
attachment; filename="f.txt"
Timing-Allow-Origin
*
Content-Length
70460
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 90A5
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=280&slotname=9020316701&adk=1157581842&adf=2573975828&w=336&fwrn=4&fwrnh=100&lmt=1528582092&rafmt=1&npa=1&guci=1.2.0.0.2.1.0&format=336x280&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0001&fwr=0&rh=0&rw=336&resp_fmts=3&wgl=1&adsid=NT&dt=1528583299332&bpp=9&bdt=241&fdt=384&idt=385&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90%2C300x250&prev_slotnames=9632121105&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1006&ady=271&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpeoE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=7&ifi=4&xpc=0cNCyYg80F&p=http%3A//www.effecthacking.com&dtd=397
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8611754734716313&output=html&h=280&slotname=9020316701&adk=1157581842&adf=2573975828&w=336&fwrn=4&fwrnh=100&lmt=1528582092&rafmt=1&npa=1&guci=1.2.0.0.2.1.0&format=336x280&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0001&fwr=0&rh=0&rw=336&resp_fmts=3&wgl=1&adsid=NT&dt=1528583299332&bpp=9&bdt=241&fdt=384&idt=385&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90%2C300x250&prev_slotnames=9632121105&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1006&ady=271&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpeoE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=7&ifi=4&xpc=0cNCyYg80F&p=http%3A//www.effecthacking.com&dtd=397
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Sat, 09 Jun 2018 22:28:19 GMT
server
cafe
cache-control
private
content-length
15355
x-xss-protection
1; mode=block
set-cookie
IDE=AHWqTUn-g6DMMevNd6xMZ01HGI85a61Rd01Jatosz7cLc1VgorF1SgmP6WjbsXyQ; expires=Thu, 04-Jul-2019 22:28:19 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
expires
Sat, 09 Jun 2018 22:28:19 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/ Frame 439B
185 KB
0
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
c486d301e3e01ccc5ed592c93b1f64858230171d77d249bcc43f55114e4afdd8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Content-Type
text/javascript; charset=UTF-8
Server
cafe
ETag
958556953946447520
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=1209600
Content-Disposition
attachment; filename="f.txt"
Timing-Allow-Origin
*
Content-Length
70460
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame F891
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&h=600&slotname=8880715901&adk=1232427434&adf=2423644460&w=300&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0001&wgl=1&adsid=NT&dt=1528583299399&bpp=9&bdt=308&fdt=370&idt=373&shv=r20180606&cbv=r20180604&saldr=sa&abxe=1&prev_fmts=728x90%2C300x250%2C336x280&prev_slotnames=9632121105&correlator=1883445929353&pv_h_ch=L0001&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1006&ady=2048&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=5&xpc=EJucLwIoxf&p=http%3A//www.effecthacking.com&dtd=386
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8611754734716313&output=html&h=600&slotname=8880715901&adk=1232427434&adf=2423644460&w=300&lmt=1528582092&npa=1&guci=1.2.0.0.2.1.0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&flash=0&host=ca-host-pub-1556223355139109&h_ch=L0001&wgl=1&adsid=NT&dt=1528583299399&bpp=9&bdt=308&fdt=370&idt=373&shv=r20180606&cbv=r20180604&saldr=sa&abxe=1&prev_fmts=728x90%2C300x250%2C336x280&prev_slotnames=9632121105&correlator=1883445929353&pv_h_ch=L0001&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1006&ady=2048&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=0&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CpoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=7&ifi=5&xpc=EJucLwIoxf&p=http%3A//www.effecthacking.com&dtd=386
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUmse_WSHI5y3RNqBcq6ObafzH-waiLpjWDdwHvhqjqnRmv3jCv7zTnNe50r
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Sat, 09 Jun 2018 22:28:20 GMT
server
cafe
cache-control
private
content-length
15563
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
postmessageRelay
accounts.google.com/o/oauth2/ Frame 1719
0
0
Document
General
Full URL
https://accounts.google.com/o/oauth2/postmessageRelay?parent=http%3A%2F%2Fwww.effecthacking.com&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
Requested by
Host: apis.google.com
URL: https://apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=auth/exm=page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/cb=gapi.loaded_1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
216.58.208.45 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f45.1e100.net
Software
ESF /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-EnbWBbPckOpdOaXlkeBJjqlgnBM' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'none';report-uri /o/cspreport
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
accounts.google.com
:scheme
https
:path
/o/oauth2/postmessageRelay?parent=http%3A%2F%2Fwww.effecthacking.com&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
cookie
NID=132=0cdC2GJPzKsG_sUamuroRRK09RnoxdGd7K078APW55LnAhGr7TMmxOGkNcSySoKwWdjNGOFMkPhGb9xuAlbVHG-j3UQi5g09zfXIhKz5UlCE3jhCqXngWxhLaYBqfJ0O
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 09 Jun 2018 22:28:19 GMT
content-security-policy
script-src 'report-sample' 'nonce-EnbWBbPckOpdOaXlkeBJjqlgnBM' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'none';report-uri /o/cspreport
content-encoding
gzip
server
ESF
x-xss-protection
1; mode=block
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
navbar.g
www.blogger.com/ Frame 5DE8
0
0
Document
General
Full URL
https://www.blogger.com/navbar.g?targetBlogID=5477678119341908769&blogName=Effect++Hacking&publishMode=PUBLISH_MODE_HOSTED&navbarType=LIGHT&layoutType=LAYOUTS&searchRoot=http://www.effecthacking.com/search&blogLocale=en&v=2&homepageUrl=http://www.effecthacking.com/&targetPostID=8308753457548451516&blogPostOrPageUrl=http://www.effecthacking.com/2018/06/windows-exploit-suggester.html&vt=1750245299205092187&usegapi=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
Requested by
Host: apis.google.com
URL: https://apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.f5JujS1eFMY.O/m=page,plusone/rt=j/sv=1/d=1/ed=1/am=QQE/rs=AGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A/cb=gapi.loaded_0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'self' *.google.com *.google-analytics.com 'unsafe-inline' 'unsafe-eval' *.gstatic.com *.googlesyndication.com *.blogger.com *.googleapis.com uds.googleusercontent.com https://s.ytimg.com https://i18n-cloud.appspot.com www-onepick-opensocial.googleusercontent.com www-bloggervideo-opensocial.googleusercontent.com www-blogger-opensocial.googleusercontent.com https://www.blogblog.com; report-uri /cspreport
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.blogger.com
:scheme
https
:path
/navbar.g?targetBlogID=5477678119341908769&blogName=Effect++Hacking&publishMode=PUBLISH_MODE_HOSTED&navbarType=LIGHT&layoutType=LAYOUTS&searchRoot=http://www.effecthacking.com/search&blogLocale=en&v=2&homepageUrl=http://www.effecthacking.com/&targetPostID=8308753457548451516&blogPostOrPageUrl=http://www.effecthacking.com/2018/06/windows-exploit-suggester.html&vt=1750245299205092187&usegapi=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.en_US.f5JujS1eFMY.O%2Fm%3D__features__%2Fam%3DQQE%2Frt%3Dj%2Fd%3D1%2Frs%3DAGLTcCNDI1_ftdVIpg6jNiygedEKTreQ2A
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
CP="This is not a P3P policy! See https://www.google.com/support/accounts/bin/answer.py?hl=en&answer=151657 for more info."
content-security-policy
script-src 'self' *.google.com *.google-analytics.com 'unsafe-inline' 'unsafe-eval' *.gstatic.com *.googlesyndication.com *.blogger.com *.googleapis.com uds.googleusercontent.com https://s.ytimg.com https://i18n-cloud.appspot.com www-onepick-opensocial.googleusercontent.com www-bloggervideo-opensocial.googleusercontent.com www-blogger-opensocial.googleusercontent.com https://www.blogblog.com; report-uri /cspreport
content-type
text/html; charset=UTF-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 09 Jun 2018 22:28:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
2713
server
GSE
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
KillChain.png
3.bp.blogspot.com/-Q5fEsrZHgJ8/Wwxxuxxi3QI/AAAAAAAAMrs/9CJJlcrHNu4JFvHulQlL9Oni7TxSkYwWwCLcBGAs/s1600/
804 KB
805 KB
Image
General
Full URL
https://3.bp.blogspot.com/-Q5fEsrZHgJ8/Wwxxuxxi3QI/AAAAAAAAMrs/9CJJlcrHNu4JFvHulQlL9Oni7TxSkYwWwCLcBGAs/s1600/KillChain.png
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
61394966b5d636d129d9f20e6520e7838c36cc30cb8f5b85eb93bf359c650f45
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:28:19 GMT
x-content-type-options
nosniff
age
0
status
200
content-disposition
inline;filename="KillChain.png"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
823416
x-xss-protection
1; mode=block
server
fife
etag
"v32bc"
vary
Origin
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Wed, 06 Jun 2018 11:37:33 GMT
KillChain_Screenshot.png
4.bp.blogspot.com/-Eb66alaS7Xo/WwxJ1kawNbI/AAAAAAAAMrg/LDE0K0n5fw8G2_OqZAZ20Ht3KNYkNkuCACLcBGAs/s1600/
10 KB
10 KB
Image
General
Full URL
https://4.bp.blogspot.com/-Eb66alaS7Xo/WwxJ1kawNbI/AAAAAAAAMrg/LDE0K0n5fw8G2_OqZAZ20Ht3KNYkNkuCACLcBGAs/s1600/KillChain_Screenshot.png
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.208.33 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f1.1e100.net
Software
fife /
Resource Hash
62f08fda041d99d8f4786859962c9ccdd483fe862de9af256220b47a1ae72212
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:28:19 GMT
x-content-type-options
nosniff
status
200
content-disposition
inline;filename="KillChain_Screenshot.png"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
9842
x-xss-protection
1; mode=block
server
fife
etag
"v32b9"
vary
Origin
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sun, 10 Jun 2018 22:28:19 GMT
REXT.png
1.bp.blogspot.com/-NsOhztd4g7g/Wr0fa77kvnI/AAAAAAAAMTs/2xm_CfmNJmMPn8HrA6qubuTiUxvDKbaXgCLcBGAs/s1600/
276 KB
277 KB
Image
General
Full URL
https://1.bp.blogspot.com/-NsOhztd4g7g/Wr0fa77kvnI/AAAAAAAAMTs/2xm_CfmNJmMPn8HrA6qubuTiUxvDKbaXgCLcBGAs/s1600/REXT.png
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
8f962a233a597fdbfb3b19757c2c0289a3d59bcf756e9996a10a238fcd8d4caf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:28:19 GMT
x-content-type-options
nosniff
status
200
content-disposition
inline;filename="REXT.png"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
283108
x-xss-protection
1; mode=block
server
fife
etag
"v313c"
vary
Origin
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sun, 10 Jun 2018 22:28:19 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/ Frame 5B0D
185 KB
0
Script
General
Full URL
http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
HTTP/1.1
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
c486d301e3e01ccc5ed592c93b1f64858230171d77d249bcc43f55114e4afdd8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

Date
Sat, 09 Jun 2018 22:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Content-Type
text/javascript; charset=UTF-8
Server
cafe
ETag
958556953946447520
Vary
Accept-Encoding
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Cache-Control
private, max-age=1209600
Content-Disposition
attachment; filename="f.txt"
Timing-Allow-Origin
*
Content-Length
70460
X-XSS-Protection
1; mode=block
Expires
Sat, 09 Jun 2018 22:28:19 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 401A
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8611754734716313&output=html&adk=1812271804&adf=3025194257&lmt=1528582092&plat=1%3A32776%2C2%3A16809992%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C26%3A32768%2C30%3A1081344&npa=1&guci=1.2.0.0.2.1.0&format=0x0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1528583299332&bpp=161&bdt=242&fdt=529&idt=531&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90%2C300x250%2C336x280&prev_slotnames=9632121105%2C8880715901&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=0&ady=0&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=2&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cpnr%7C&abl=CS&ppjl=u&fu=16&bc=7&ifi=5&dtd=546
Requested by
Host: pagead2.googlesyndication.com
URL: http://pagead2.googlesyndication.com/pagead/js/r20180606/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8611754734716313&output=html&adk=1812271804&adf=3025194257&lmt=1528582092&plat=1%3A32776%2C2%3A16809992%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C26%3A32768%2C30%3A1081344&npa=1&guci=1.2.0.0.2.1.0&format=0x0&url=http%3A%2F%2Fwww.effecthacking.com%2F2018%2F06%2Fwindows-exploit-suggester.html%3Fm%3D1&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1528583299332&bpp=161&bdt=242&fdt=529&idt=531&shv=r20180606&cbv=r20180604&saldr=aa&abxe=1&prev_fmts=728x90%2C300x250%2C336x280&prev_slotnames=9632121105%2C8880715901&correlator=1883445929353&frm=20&pv=1&ga_vid=269349537.1528583299&ga_sid=1528583299&ga_hid=1755637002&ga_fc=0&iag=0&icsg=173990906380&dssz=47&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=0&ady=0&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21061122%2C368226401&oid=3&rx=0&eae=2&fc=1808&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cpnr%7C&abl=CS&ppjl=u&fu=16&bc=7&ifi=5&dtd=546
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUmse_WSHI5y3RNqBcq6ObafzH-waiLpjWDdwHvhqjqnRmv3jCv7zTnNe50r; test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Sat, 09 Jun 2018 22:28:19 GMT
server
cafe
cache-control
private
content-length
64
x-xss-protection
1; mode=block
set-cookie
test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",quic=":443"; ma=2592000; v="43,42,41,39,35"
expires
Sat, 09 Jun 2018 22:28:19 GMT
mAiQUwlReIP.js
staticxx.facebook.com/connect/xd_arbiter/r/ Frame BD3A
0
0
Document
General
Full URL
http://staticxx.facebook.com/connect/xd_arbiter/r/mAiQUwlReIP.js?version=42
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/pt_BR/sdk.js
Protocol
HTTP/1.1
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Host
staticxx.facebook.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

Expires
Sun, 09 Jun 2019 06:08:21 GMT
X-XSS-Protection
0
Content-Type
text/html; charset=utf-8
X-Content-Type-Options
nosniff
Cache-Control
public,max-age=31536000,immutable
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Vary
Accept-Encoding
Content-Encoding
gzip
X-FB-Debug
5ix3I89HzMjPXBoZy3/vJjPgKY+U4YhanhXmr2ItlioYwAQR2J6Zic1hAf+BAGZmWbg3hNmDQ4E6TwxzgCtGzg==
Date
Sat, 09 Jun 2018 22:28:20 GMT
Connection
keep-alive
Content-Length
13666
mAiQUwlReIP.js
staticxx.facebook.com/connect/xd_arbiter/r/ Frame AC8F
0
0
Document
General
Full URL
https://staticxx.facebook.com/connect/xd_arbiter/r/mAiQUwlReIP.js?version=42
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/pt_BR/sdk.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
staticxx.facebook.com
:scheme
https
:path
/connect/xd_arbiter/r/mAiQUwlReIP.js?version=42
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
07BF0D11405305785E0F2548BDB4455D
Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1

Response headers

status
200
expires
Sun, 09 Jun 2019 06:08:21 GMT
x-xss-protection
0
content-type
text/html; charset=utf-8
x-content-type-options
nosniff
cache-control
public,max-age=31536000,immutable
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
vary
Accept-Encoding
content-encoding
gzip
x-fb-debug
5ix3I89HzMjPXBoZy3/vJjPgKY+U4YhanhXmr2ItlioYwAQR2J6Zic1hAf+BAGZmWbg3hNmDQ4E6TwxzgCtGzg==
content-length
13666
date
Sat, 09 Jun 2018 22:28:20 GMT
p0wnedShell.jpg
2.bp.blogspot.com/-v3dIo85jtiQ/Wxpb9wR035I/AAAAAAAAMtE/yRec0rOx_0Ebbn2ARFJs_DFPpDWPn6GpgCLcBGAs/s1600/
68 KB
68 KB
Image
General
Full URL
https://2.bp.blogspot.com/-v3dIo85jtiQ/Wxpb9wR035I/AAAAAAAAMtE/yRec0rOx_0Ebbn2ARFJs_DFPpDWPn6GpgCLcBGAs/s1600/p0wnedShell.jpg
Requested by
Host: www.effecthacking.com
URL: http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
Protocol
SPDY
Server
216.58.207.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f1.1e100.net
Software
fife /
Resource Hash
2358c230496415864c762bfec46d5fd03b8c0e24f57da42ea384c662b9966e19
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sat, 09 Jun 2018 22:01:47 GMT
x-content-type-options
nosniff
age
1593
status
200
content-disposition
inline;filename="p0wnedShell.jpg"
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
69324
x-xss-protection
1; mode=block
server
fife
etag
"v32d2"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sat, 09 Jun 2018 13:40:39 GMT
368954415-lightbox_bundle.css
www.blogger.com/static/v1/v-css/
35 KB
7 KB
Stylesheet
General
Full URL
https://www.blogger.com/static/v1/v-css/368954415-lightbox_bundle.css
Requested by
Host: www.blogger.com
URL: https://www.blogger.com/static/v1/widgets/476324606-widgets.js
Protocol
SPDY
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
sffe /
Resource Hash
b60a462099b715aa3a5442a07142b969b9bb9c5ecee1bbdabea2e23f2d499458
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Fri, 18 May 2018 16:59:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 18 May 2018 02:15:00 GMT
server
sffe
age
1920525
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
6541
x-xss-protection
1; mode=block
expires
Sat, 18 May 2019 16:59:35 GMT
2008574541-lbx.js
www.blogger.com/static/v1/jsbin/
390 KB
127 KB
Script
General
Full URL
https://www.blogger.com/static/v1/jsbin/2008574541-lbx.js
Requested by
Host: www.blogger.com
URL: https://www.blogger.com/static/v1/widgets/476324606-widgets.js
Protocol
SPDY
Server
216.58.207.73 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f9.1e100.net
Software
sffe /
Resource Hash
8a44fd6cff56882e01387bcb683170f1a22bcc439bca85f3c3f100c18a772715
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.effecthacking.com/2018/06/windows-exploit-suggester.html?m=1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Thu, 07 Jun 2018 00:51:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 05 Jun 2018 17:30:00 GMT
server
sffe
age
250610
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
129945
x-xss-protection
1; mode=block
expires
Fri, 07 Jun 2019 00:51:30 GMT

Verdicts & Comments Add Verdict or Comment

248 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| adsbygoogle string| GoogleAnalyticsObject function| ga object| google_js_reporting_queue object| google_ad_modifications boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state function| $ function| jQuery function| google_spfd number| google_unique_id object| google_sv_map object| google_t12n_vars object| google_jobrunner object| google_iframe_oncopy object| google_ad_client object| google_ad_slot object| google_ad_width object| google_ad_height boolean| google_onload_fired object| google_ad_block object| google_ad_channel object| google_ad_format object| google_ad_host object| google_ad_host_channel object| google_ad_host_tier_id object| google_ad_layout object| google_ad_layout_key object| google_ad_output object| google_ad_region object| google_ad_section object| google_ad_type object| google_ad_unit_key object| google_ad_dom_fingerprint object| google_adtest object| fwifhbc object| google_allow_expandable_ads object| google_alternate_ad_url object| google_alternate_color object| google_ama object| google_analytics_url_parameters object| google_available_width object| google_captcha_token object| google_city object| google_color_bg object| google_color_border object| google_color_line object| google_color_link object| google_color_text object| google_color_url object| google_container_id object| google_content_recommendation_ad_positions object| google_content_recommendation_columns_num object| google_content_recommendation_rows_num object| google_content_recommendation_ui_type object| google_contents object| google_core_dbp object| google_country object| google_cpm object| google_ctr_threshold object| google_cust_age object| google_cust_ch object| google_cust_criteria object| google_cust_gender object| google_cust_id object| google_cust_interests object| google_cust_job object| google_cust_l object| google_cust_lh object| google_cust_u_url object| google_disable_video_autoplay object| google_eids object| google_enable_content_recommendations object| google_enable_ose object| google_encoding object| google_font_face object| google_font_size object| google_frame_id object| google_full_width_responsive_allowed object| efwr object| google_full_width_responsive object| gfwroh object| gfwrow object| gfwroml object| gfwromr object| gfwroz object| gfwrnh object| gfwrnwer object| gfwrnher object| google_gl object| google_hints object| google_image_size object| google_kw object| google_kw_type object| google_lact object| google_language object| google_loeid object| google_max_num_ads object| google_max_radlink_len object| google_max_responsive_height object| google_mtl object| google_native_ad_template object| google_native_settings_key object| google_num_radlinks object| google_num_radlinks_per_unit object| google_only_pyv_ads object| google_override_format object| google_page_url object| google_pgb_reactive object| google_pucrd object| google_referrer_url object| google_region object| google_resizing_allowed object| google_resizing_height object| google_resizing_width object| google_responsive_formats object| google_responsive_auto_format object| google_rl_dest_url object| google_rl_filtering object| google_rl_mode object| google_rt object| google_safe object| google_safe_for_responsive_override object| google_scs object| google_source_type object| google_sui object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_tag_origin object| google_tag_partner object| google_targeting object| google_tfs object| google_video_doc_id object| google_video_product_type object| google_video_url_to_fetch object| google_webgl_support object| google_yt_pt object| google_yt_up object| obj0 object| obj1 string| s number| r object| gaplugins object| gaGlobal object| gaData function| BLOG_CMT_createIframe object| ___gcfg object| google_persistent_state_async object| google_pub_config object| __google_ad_urls number| google_global_correlator object| google_prev_clients object| ampInaboxIframes object| ampInaboxPendingMessages function| Goog_AdSense_getAdAdapterInstance boolean| google_osd_loaded function| setAttributeOnload object| gapi object| ___jsl object| ___gu object| MONTH_FORMAT string| NO_IMAGE number| WIDGET_RECENT_POST_NUM number| WIDGET_RANDOM_POST_NUM number| WIDGET_RECENT_COMMENT_NUM number| POSTPERPAGE_NUM number| LABEL_SEARCH_NUM string| POSTNAV_PREV_TEXT string| POSTNAV_NEXT_TEXT object| _0x593c function| selectnav object| jQuery1122030376721453231137 object| _0x9503 number| postperpage number| numshowpage string| upPageWord string| downPageWord string| urlactivepage string| home_page function| BLOG_attachCsiOnload function| _WidgetManager function| _WidgetInfo function| widget_module_provide function| _AdSenseView function| _BlogArchiveView function| _AttributionView function| _BlogView function| _BlogListView function| _BlogSearchView function| _ContactFormView function| _CustomSearchView function| _ExampleView function| _FeaturedPostView function| _FeedView function| _FollowByEmailView function| _FollowersView function| _GadgetView function| _HeaderView function| _TextView function| _HTMLView function| _ImageView function| _LabelView function| _TextListView function| _LinkListView function| _BloggerButtonView function| _NavbarView function| _PageListView function| _PlusBadgeView function| _PlusFollowersView function| _PlusOneView function| _PollView function| _PopularPostsView function| _ProfileView function| _RecentPostsView function| _ReportAbuseView function| _SharingView function| _SlideshowView function| _StatsView function| _SubscribeView function| _SW_toggleReaderList function| _SW_hideReaderList function| _TranslateView function| _VideoBarView function| _WikipediaView string| __wavt function| __gjsload__ object| closure_lm_762005 object| cookieChoices function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure boolean| google_empty_script_included object| osapi object| gadgets object| iframer object| __gapi_jstiming__ object| shindig function| ToolbarApi object| iframes function| IframeBase function| Iframe function| IframeProxy function| IframeWindow object| FB function| google_osd_amcb function| createAutoComplete

8 Cookies

Domain/Path Name / Value
.doubleclick.net/ Name: IDE
Value: AHWqTUn-g6DMMevNd6xMZ01HGI85a61Rd01Jatosz7cLc1VgorF1SgmP6WjbsXyQ
.doubleclick.net/ Name: DSID
Value: NO_DATA
.google.com/ Name: NID
Value: 132=0cdC2GJPzKsG_sUamuroRRK09RnoxdGd7K078APW55LnAhGr7TMmxOGkNcSySoKwWdjNGOFMkPhGb9xuAlbVHG-j3UQi5g09zfXIhKz5UlCE3jhCqXngWxhLaYBqfJ0O
accounts.google.com/ Name: GAPS
Value: 1:EXPSVuRnCq5Q3iElHjJcKKTaDktI0g:mozWhSN-QnP7DpNO
.blogger.com/ Name: S
Value: blogger=HnvjmLnjs2yxpWCzbSbvKqClrCRhzPwM
.effecthacking.com/ Name: _gat_blogger
Value: 1
.effecthacking.com/ Name: _gid
Value: GA1.2.1921511622.1528583299
.effecthacking.com/ Name: _ga
Value: GA1.2.269349537.1528583299

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

1.bp.blogspot.com
2.bp.blogspot.com
3.bp.blogspot.com
4.bp.blogspot.com
accounts.google.com
adservice.google.com
adservice.google.de
ajax.googleapis.com
apis.google.com
connect.facebook.net
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
maxcdn.bootstrapcdn.com
netoopscodes.googlecode.com
pagead2.googlesyndication.com
resources.blogblog.com
staticxx.facebook.com
stats.g.doubleclick.net
www.blogger.com
www.effecthacking.com
www.facebook.com
www.google-analytics.com
172.217.22.2
172.217.22.42
172.217.23.142
172.217.23.147
173.194.76.82
185.60.216.19
185.60.216.38
209.197.3.15
216.58.207.65
216.58.207.67
216.58.207.73
216.58.207.74
216.58.207.78
216.58.208.33
216.58.208.41
216.58.208.45
74.125.71.156
015bccd63a574af0e11ff55a87419669e115a2bc4f2ced6cbbbd450fb8928f75
01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
068ffe90977f2b5b2dc2ef18572166e85281bd0ecb31c4902464b23db54d2568
0e01889ff14cc32ec52e55e321370ad87e8dd77ef7f5ef5bbac42481d7d80402
11c7da04ababda42b2d010d0f4eaf8f62772c1057157329261986e6f12cf31c6
223a1318b2e4e435100565d9c01849d188d0d52a1a08c28b329cb69b79542cce
2358c230496415864c762bfec46d5fd03b8c0e24f57da42ea384c662b9966e19
24a9de1d83e75b72942a1b7d4ed5567016bb77bba6fef05b00ebc9c46b3125e3
252ebac3063fcbd9bc22949fb95cb3289e0110d89b96fab7d712d187d3c13331
29d87e19df7e2feb60607d59ddc0f5cd2e90001ee9da38f010ab4dcb3799dcc4
3fab1c883847e4b5a02f3749a9f4d9eab15cd4765873d3b2904a1a4c8755fba3
41c8581d8f579fd226b4122b2129ad00a950b8c65380e2ec8c40adddd1161c07
44d589bbff79745dc092337c25c77816ca78767b8d5aeb2179c1157895eec2b2
4dee4aecad23c898cc56c97b59e211ee1ed63fa1ff665ff150b3ee3fc6f493ff
5b050deeb851ebc36511e7633b21dc15deef4fefe2be3229cd1802a287985f23
61394966b5d636d129d9f20e6520e7838c36cc30cb8f5b85eb93bf359c650f45
62cc1396743d95e524559bcf19c767bfe171fe53c7dade4e0c8ba19e22a7897c
62f08fda041d99d8f4786859962c9ccdd483fe862de9af256220b47a1ae72212
66dc995d8af6f17d9e3931e5de51ef935684a6cbf609a2284d723292676802c0
7982f32394d732dcaf580d9be8ad50b81b48547c0c850e2039fc06de5801f351
7a28178f673adcd9fc1c31e335e91cbccdb9729c12c6cc311957cc32821425ef
7dce5793d26f56e652608f82de5a4df8d6102d138f924a6c261d6896b70bf561
7efbd86cc7b38ff4073967d7ec290934fc421eb2ed25ed3ec1592d79826e610c
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
8a44fd6cff56882e01387bcb683170f1a22bcc439bca85f3c3f100c18a772715
8e40a297047f43a672140d747c446f75cbeb62ca16898ab2a3a7fc88842566d1
8f962a233a597fdbfb3b19757c2c0289a3d59bcf756e9996a10a238fcd8d4caf
95914789b5f3307a3718679e867d61b9d4c03f749cd2e2970570331d7d6c8ed9
95a8e5dd1deb430f39b4c0bfda688349c733e3c595d61d068980e72263b775af
97dbf173d12fa6ab3f132cba210c9bf94838704502b53a4a67205d0c669ebf63
9ab222347578ca0ec423daad8b0e694c643f51809cb96646c55cf630d586055f
9f530039cddbedee4357c5f02a8f199ea35fcc83a8dbaa6ccdbef206dd1ce791
a390cf62fca4217670690ed84dcb7f8d569348f6ef9ef61b3ea4bc15c4548561
a78b4e3aa87245cb3d259b8f0e7a213196ac24e5b0d1b6296bfd76fcd8264151
ad3f5743027d58f0c5e8b2f074edc3fb50e776ddecdb8a90531fd30407d6ff48
b5d7707ea8fc00aae40bf500ac7498d7f32f6b1bbff7b4fde976a40345eb5f9d
b60a462099b715aa3a5442a07142b969b9bb9c5ecee1bbdabea2e23f2d499458
c486d301e3e01ccc5ed592c93b1f64858230171d77d249bcc43f55114e4afdd8
c4c1b7760c095804a679a51b4c7f7d6138d6db722c4210976b1e9381f0e07ce0
ccecd185ac16ba0a538840f37701053fbb861f7fbbdd86039c7415fcd924d1f2
d172d750493be64a7ed84dec1dd2a0d787ba42f78bc694b0858f152c52b6620b
d3ebb498192527b985939ae62cc4e5eb5c108efc1896184126b45d866868e73d
db8fffd7cf440ede14d615edb0b2e0fdb5d1c8b0471dca3206a8c7fbf82cacf1
dd7124b9436ca3a4cad4b88f8eeb9e42696d69d11d6f810725e1ea1820b95924
de25acdd2b6a59503283ff5a137d1283f7f7e1da821b1c78adc6cf11027d330a
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e49e9b2cbc32dcf5da1912c348d0e35fa0c719feb2aa87a3ddf731efc89b880d
e8231877de0f767620885ff6967761fdd4897da4283a2110b1d202cb6333a532
ebe2f09090a7482bb5e2d7f8349d09f9124a8c2bda578ff52fbc21993c9a488a
f865b691fa029713f237ec5547ac007928c5ae2aa4698eb3a6c5578fe5d9d65e
f9b08cc67fd40704abddb4574e68238a909e8346c7d8efd49677ca094e2dcbb1
fccf51e5a89cfae6e766442d94184ab23f2ab6d7953d987e00d1bd073e05af95