Submitted URL: https://ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-...
Effective URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-...
Submission Tags: falconsandbox
Submission: On June 09 via api from US

Summary

This website contacted 14 IPs in 2 countries across 12 domains to perform 39 HTTP transactions. The main IP is 2606:4700::6812:91, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.ired.team.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 27th 2020. Valid for: a year.
This is the only time www.ired.team was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
8 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a04:4e42:600... 54113 (FASTLY)
9 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 1 209.59.132.164 32244 (LIQUIDWEB)
1 72.52.228.51 32244 (LIQUIDWEB)
1 2606:4700:7::... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700:303... 13335 (CLOUDFLAR...)
3 2a00:1450:400... 15169 (GOOGLE)
8 2600:1901:0:9... 15169 (GOOGLE)
39 14
Domain Requested by
8 gblobscdn.gitbook.com www.ired.team
7 s-usc1c-nss-230.firebaseio.com gstatic.gitbook.com
7 gstatic.gitbook.com www.ired.team
gstatic.gitbook.com
3 www.google-analytics.com gstatic.gitbook.com
2 www.ired.team www.ired.team
1 gitbook-28427.firebaseio.com gstatic.gitbook.com
1 www.gitbook.com gstatic.gitbook.com
1 app.gitbook.com gstatic.gitbook.com
1 cdn.lr-ingest.io gstatic.gitbook.com
1 fonts.gstatic.com fonts.googleapis.com
1 miro.medium.com www.ired.team
1 www.stealthbits.com www.ired.team
1 blog.stealthbits.com 1 redirects
1 lh5.googleusercontent.com www.ired.team
1 polyfill.io www.ired.team
1 unpkg.com www.ired.team
1 fonts.googleapis.com www.ired.team
1 ired.team 1 redirects
39 18
Subject Issuer Validity Valid
www.ired.team
Cloudflare Inc ECC CA-3
2020-11-27 -
2021-11-26
a year crt.sh
upload.video.google.com
GTS CA 1O1
2021-05-10 -
2021-08-02
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-08-02 -
2021-08-02
a year crt.sh
polyfill.io
GlobalSign Atlas R3 DV TLS CA 2020
2021-06-04 -
2022-07-06
a year crt.sh
*.googleusercontent.com
GTS CA 1C3
2021-05-10 -
2021-08-02
3 months crt.sh
stealthbits.com
cPanel, Inc. Certification Authority
2021-05-25 -
2021-08-23
3 months crt.sh
medium.com
Cloudflare Inc ECC CA-3
2021-05-06 -
2021-08-03
3 months crt.sh
*.google.com
GTS CA 1O1
2021-05-10 -
2021-08-02
3 months crt.sh
*.google-analytics.com
GTS CA 1C3
2021-05-17 -
2021-08-09
3 months crt.sh
firebaseio.com
GTS CA 1O1
2021-01-12 -
2021-07-11
6 months crt.sh

This page contains 3 frames:

Primary Page: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Frame ID: DD5E12CBA3842A17D1025B752F088ECE
Requests: 31 HTTP requests in this frame

Frame: https://gitbook-28427.firebaseio.com/.lp?start=t&ser=59569926&cb=1&v=5
Frame ID: 72C1C072DF60F74CC6C66BF4864675A4
Requests: 7 HTTP requests in this frame

Frame: https://s-usc1c-nss-230.firebaseio.com/.lp?dframe=t&id=173099&pw=i7cvQ0nM3c&ns=gitbook-28427
Frame ID: 909CE0E8707A792F500FD0E421F629A1
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password... HTTP 301
    https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<[^>]+data-react/i

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /\/polyfill\.min\.js/i

Page Statistics

39
Requests

97 %
HTTPS

87 %
IPv6

12
Domains

18
Subdomains

14
IPs

2
Countries

2525 kB
Transfer

8852 kB
Size

5
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync HTTP 301
    https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 8
  • https://blog.stealthbits.com/wp-content/uploads/2017/07/Mimikatz-Attacks-1.jpg HTTP 301
  • https://www.stealthbits.com/blog/wp-content/uploads/2017/07/Mimikatz-Attacks-1.jpg

39 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request dump-password-hashes-from-domain-controller-with-dcsync
www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/
Redirect Chain
  • https://ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
  • https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
2 MB
413 KB
Document
General
Full URL
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:91 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5bfcc4772aa1619f38598f35340094234a42e654811dca71521fb7fad27c1058
Security Headers
Name Value
Content-Security-Policy default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.ired.team
:scheme
https
:path
/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
content-type
text/html; charset=utf-8
cf-ray
65cc46802d2605fd-FRA
age
16325
cache-control
public, max-age=86400, s-maxage=86400, stale-while-revalidate=3600, stale-if-error=43200
strict-transport-security
max-age=31536000; includeSubDomains
vary
Accept-Encoding, Authorization, Cookie, X-CDN-Host
cf-cache-status
HIT
cf-request-id
0a938a641a000005fdbb97f000000001
content-security-policy
default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
function-execution-id
ufe6qlbuoj1t
referrer-policy
no-referrer-when-downgrade
x-cdn-cache-group
-LFEMnER3fywgFHoroYn
x-cloud-trace-context
d953960b9ddfd3305421d896cbdacbcf
x-content-type-options
nosniff
x-dns-prefetch-control
off
x-download-options
noopen
x-permitted-cross-domain-policies
none
x-xss-protection
1; mode=block
server
cloudflare
content-encoding
gzip

Redirect headers

date
Wed, 09 Jun 2021 18:03:13 GMT
cache-control
max-age=3600
expires
Wed, 09 Jun 2021 19:03:13 GMT
location
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
cf-request-id
0a938a63c400004e9e8f8e5000000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=Btkw0utKOutQ25eySVHPC2DTa8U%2BZN7zuCDq3r%2FIXpskUqPvMsSFwpDmBzQDAZjpBG7BiVtqDOpy%2FMM37O3jYYzZtBToqMpXO04tVcMiMvzHWGwsuTkZ1YOM6QdBGqcZPPWO"}],"group":"cf-nel","max_age":604800}
nel
{"report_to":"cf-nel","max_age":604800}
vary
Accept-Encoding
server
cloudflare
cf-ray
65cc467f98064e9e-FRA
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
css
fonts.googleapis.com/
2 KB
659 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Source+Code+Pro:500&display=swap
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
6da43a0ac4abcb5bc4b10164a762759e5cc81f37e00033643034a891fb490c82
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Wed, 09 Jun 2021 17:06:59 GMT
server
ESF
date
Wed, 09 Jun 2021 18:03:13 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 09 Jun 2021 18:03:13 GMT
emojione-sprite-40.min.css
unpkg.com/emojione-assets@4.0.0/sprites/
183 KB
14 KB
Stylesheet
General
Full URL
https://unpkg.com/emojione-assets@4.0.0/sprites/emojione-sprite-40.min.css
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7aaf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5e939d7d3f9c9bfe632d16484c12354fa89a12738f30f738aa81c984e5b9a92
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
age
6813552
vary
Accept-Encoding
cf-request-id
0a938a64a700004a565b93f000000001
last-modified
Sat, 26 Oct 1985 08:15:00 GMT
server
cloudflare
etag
W/"2dc7c-MlEndlChcp6B66cJCh5yD8CB/Fo"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/css; charset=utf-8
access-control-allow-origin
*
x-cloud-trace-context
e0ac7d85fe9bfe99ddd0e0018c758a56
cache-control
public, max-age=31536000
cf-ray
65cc46810c794a56-FRA
6c3c9dec9383137845be0f0ea2cf1bf4.css
gstatic.gitbook.com/css/
1 KB
1 KB
Stylesheet
General
Full URL
https://gstatic.gitbook.com/css/6c3c9dec9383137845be0f0ea2cf1bf4.css
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5ff636c13e4983198fbed7d325d1cbafbe544702de06f5874c46e359ce68b43

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
content-encoding
gzip
cf-cache-status
HIT
age
4165733
cf-polished
origSize=1701
x-guploader-uploadid
ABg5-UwiIdAcAjrmRlFxwdUIs61NAokkry_-iZ807hfyhPF7n05ywV-MhhKGJXAj1nhFXaaZ1Wx1tw1RuwfcZvRBTHA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
text/css
cf-request-id
0a938a64c40000062996827000000001
last-modified
Wed, 07 Apr 2021 08:43:49 GMT
server
cloudflare
etag
W/"6c3c9dec9383137845be0f0ea2cf1bf4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=hL62rA==, md5=bDyd7JODE3hFvg8Oos8b9A==
x-goog-generation
1617785029532093
access-control-allow-origin
*
expires
Thu, 21 Apr 2022 20:23:08 GMT
cache-control
public, max-age=31536000
x-goog-stored-content-length
1701
cf-ray
65cc4681292f0629-FRA
cf-bgj
minify
polyfill.min.js
polyfill.io/v3/
72 B
559 B
Script
General
Full URL
https://polyfill.io/v3/polyfill.min.js?flags=gated&features=Intl
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:600::621 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
aaecd144d2b8763b2fa5c91f09778294363cef363c10504205f4203922644d11
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubdomains; preload
content-encoding
br
x-content-type-options
nosniff
content-type
text/javascript; charset=utf-8
age
111831
detected-user-agent
Chrome/89.0.4389
server-timing
HIT-CLUSTER, fastly;desc="Edge time";dur=1, HIT, fastly;desc="Edge time";dur=1
content-length
74
referrer-policy
origin-when-cross-origin
last-modified
Tue, 08 Jun 2021 10:31:29 GMT
date
Wed, 09 Jun 2021 18:03:13 GMT
vary
User-Agent, Accept-Encoding
access-control-allow-methods
GET,HEAD,OPTIONS
normalized-user-agent
chrome/89.0.0
access-control-allow-origin
*
cache-control
public, s-maxage=31536000, max-age=604800, stale-while-revalidate=604800, stale-if-error=604800
accept-ranges
bytes
timing-allow-origin
*
spaces%2F-LFEMnER3fywgFHoroYn%2Favatar.png
gblobscdn.gitbook.com/
28 KB
29 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/spaces%2F-LFEMnER3fywgFHoroYn%2Favatar.png?alt=media
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aee2771f5f57ecf568ffffd5c0d0fee81b7fb2b5540e10d856f2462abdbd5f92

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
cf-cache-status
HIT
age
4101578
x-guploader-uploadid
ABg5-UzTfWJh6V0B0k2lFPabkrMdmvV3nYkpS2yXi96O2qwxzor09DJgESW3o58wiAWT6dRVCB72aizzWA6t6Q6FplW3MkbWYA
x-goog-storage-class
STANDARD
x-goog-metageneration
3
x-goog-stored-content-encoding
identity
content-type
image/png
content-length
29066
cf-request-id
0a938a64b8000005cc9b21b000000001
last-modified
Sat, 08 Sep 2018 20:00:14 GMT
server
cloudflare
etag
"2965c5f978755802debc0291c5574853"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=ALxBKw==, md5=KWXF+Xh1WALevAKRxVdIUw==
x-goog-generation
1536436814766237
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
29066
x-goog-meta-firebasestoragedownloadtokens
1910800b-eed5-42ea-b282-39d0660128fe
accept-ranges
bytes
cf-ray
65cc46812a9505cc-FRA
expires
Sat, 23 Apr 2022 06:43:34 GMT
photo.jpg
lh5.googleusercontent.com/-BT5DyX_LUys/AAAAAAAAAAI/AAAAAAAAAF4/wkmG-hKpMQk/
7 KB
7 KB
Image
General
Full URL
https://lh5.googleusercontent.com/-BT5DyX_LUys/AAAAAAAAAAI/AAAAAAAAAF4/wkmG-hKpMQk/photo.jpg
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
3e46dc2084ab2945b5af16a2d88abcd6fa7e8aa5ef5a43fc6c83ce561b6c9577
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 16:17:50 GMT
x-content-type-options
nosniff
age
6323
content-disposition
inline;filename=""
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6707
x-xss-protection
0
server
fife
etag
"v5e"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Wed, 09 Jun 2021 19:57:35 GMT
email-decode.min.js
www.ired.team/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
862 B
Script
General
Full URL
https://www.ired.team/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:91 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

:path
/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.ired.team
referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 07 Jun 2021 12:28:04 GMT
server
cloudflare
etag
W/"60be10d4-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
DENY
content-type
application/javascript
cache-control
max-age=172800 public
cf-ray
65cc4680ff8405fd-FRA
vary
Accept-Encoding
cf-request-id
0a938a649d000005fdc5a6e000000001
expires
Fri, 11 Jun 2021 18:03:13 GMT
111.f142f50e.js
gstatic.gitbook.com/js/
3 MB
945 KB
Script
General
Full URL
https://gstatic.gitbook.com/js/111.f142f50e.js
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eb929919479b2afe4e756a8ab718e9adbc8d94dbd0504da1cf4cea2b252833cc

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
content-encoding
gzip
cf-cache-status
HIT
age
4101579
cf-polished
origSize=3418521
x-guploader-uploadid
ABg5-Uz3PpVS5rmLAQqyx-Bv43SHB5qBoEgLF9EGcOUffq1ADGmF9a4Yz68fHeL2roHduhQQGD7FQcctPucVTg5fsEA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
application/javascript
cf-request-id
0a938a64cf00005369b0975000000001
expires
Fri, 22 Apr 2022 15:46:59 GMT
last-modified
Wed, 07 Apr 2021 08:43:49 GMT
server
cloudflare
etag
W/"876655ac803da8f0cf014bda9a896170"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=B4hFnA==, md5=h2ZVrIA9qPDPAUvamolhcA==
x-goog-generation
1617785029720049
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
3418521
cf-ray
65cc468148725369-FRA
cf-bgj
minify
Mimikatz-Attacks-1.jpg
www.stealthbits.com/blog/wp-content/uploads/2017/07/
Redirect Chain
  • https://blog.stealthbits.com/wp-content/uploads/2017/07/Mimikatz-Attacks-1.jpg
  • https://www.stealthbits.com/blog/wp-content/uploads/2017/07/Mimikatz-Attacks-1.jpg
131 KB
132 KB
Image
General
Full URL
https://www.stealthbits.com/blog/wp-content/uploads/2017/07/Mimikatz-Attacks-1.jpg
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.52.228.51 , United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a4673c2c7bd5a4fdfd2c6290c1636bc84efa8cef2ada3843c55868c9cf9da0e4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:16 GMT
referrer-policy
same-origin
last-modified
Tue, 11 Jul 2017 17:05:59 GMT
server
Apache
x-frame-options
SAMEORIGIN
content-type
image/jpeg
x-xss-protection
1; mode=block
cache-control
public
feature-policy
geolocation 'self'; vibrate 'none'
strict-transport-security
max-age=31536000
accept-ranges
bytes
vary
User-Agent
content-length
134298
x-content-type-options
nosniff
expires
Thu, 09 Jun 2022 18:03:16 GMT

Redirect headers

location
https://www.stealthbits.com/blog/wp-content/uploads/2017/07/Mimikatz-Attacks-1.jpg
date
Wed, 09 Jun 2021 18:03:15 GMT
server
Apache
content-length
290
x-frame-options
SAMEORIGIN
content-type
text/html; charset=iso-8859-1
0*Icen2GYXvhyUz7Av.PNG
miro.medium.com/max/1200/
74 KB
75 KB
Image
General
Full URL
https://miro.medium.com/max/1200/0*Icen2GYXvhyUz7Av.PNG
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:7::a29f:9904 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3da858ea17f1a638cb4fb0d0edbb6328ce601bf698ef58dad130f3b97efccc5
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
x-content-type-options
nosniff
cf-cache-status
REVALIDATED
x-envoy-upstream-service-time
76
strict-transport-security
max-age=15552000; includeSubDomains; preload
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
content-length
75904
cf-request-id
0a938a6648000016ea14a9b000000001
pragma
public
sepia-upstream
medium
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2592000
medium-fulfilled-by
miro/main-20210524-162717-f383c62fea
accept-ranges
bytes
cf-ray
65cc4683ad3f16ea-FRA
expires
Fri, 09 Jul 2021 18:03:14 GMT
f4fa50c4003f87e7dc10459e500933c3.woff
gstatic.gitbook.com/fonts/
92 KB
93 KB
Font
General
Full URL
https://gstatic.gitbook.com/fonts/f4fa50c4003f87e7dc10459e500933c3.woff
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3e692de9565d90dd947a080d4d10cee72a83447ba053e08fdcac457d7197128a

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
cf-cache-status
HIT
age
4100292
x-guploader-uploadid
ABg5-UxyEzdcNSdaJtXWOu_1a_Udqa_IwHrRlOjvAN1WdWLiRwt_LkJphbV5J8YSQYHy5mSn7RZDeP804aUQsKcyUKyG167dEA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
font/woff
content-length
94368
cf-request-id
0a938a662f00005369870fd000000001
last-modified
Wed, 07 Apr 2021 08:43:49 GMT
server
cloudflare
etag
"f4fa50c4003f87e7dc10459e500933c3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=FUjfEA==, md5=9PpQxAA/h+fcEEWeUAkzww==
x-goog-generation
1617785029592662
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
94368
accept-ranges
bytes
cf-ray
65cc46837e715369-FRA
expires
Wed, 20 Apr 2022 06:41:18 GMT
72e37e5bf95a8dba938c78b1d7d91253.woff
gstatic.gitbook.com/fonts/
92 KB
92 KB
Font
General
Full URL
https://gstatic.gitbook.com/fonts/72e37e5bf95a8dba938c78b1d7d91253.woff
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a18af7799b7d241fe5d00645492ccedcad39815e9f4125b7e3e90b18a1b77405

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
cf-cache-status
HIT
age
4100291
x-guploader-uploadid
ABg5-UzxMRvnWuUe4Am1soA1IEY0fTbTsCQH3JGMbwYAJB2ar3ndl9M08YuIU70qf4xw3V9sSwauwoM0moUUX62ZaFzL1i-mvQ
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
font/woff
content-length
94040
cf-request-id
0a938a662f000053699f244000000001
last-modified
Fri, 19 Mar 2021 17:17:25 GMT
server
cloudflare
etag
"72e37e5bf95a8dba938c78b1d7d91253"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=TBIniA==, md5=cuN+W/lajbqTjHix19kSUw==
x-goog-generation
1616174245162428
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
94040
accept-ranges
bytes
cf-ray
65cc46837e765369-FRA
expires
Wed, 06 Apr 2022 19:16:43 GMT
fc3d4b35e4d07d4e0485cc2db0e57c77.woff
gstatic.gitbook.com/fonts/
92 KB
92 KB
Font
General
Full URL
https://gstatic.gitbook.com/fonts/fc3d4b35e4d07d4e0485cc2db0e57c77.woff
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b87e90677bdbc3c6bc296a368f57b2d72783c1a7c6e8e9325cd1645c18039cf2

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:13 GMT
cf-cache-status
HIT
age
2319899
x-guploader-uploadid
ABg5-UwGan3w8btTIOf0-1SNEwpK9JOOZoD4LEnV2f8danvAeKtwlLE3CqzpT_qB0OsDZnlApI2ADMahkX2V5j6snsU
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
font/woff
content-length
93788
cf-request-id
0a938a663200005369a21bd000000001
last-modified
Wed, 07 Apr 2021 08:43:49 GMT
server
cloudflare
etag
"fc3d4b35e4d07d4e0485cc2db0e57c77"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=7TN+QQ==, md5=/D1LNeTQfU4EhcwtsOV8dw==
x-goog-generation
1613469465501597
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
93788
accept-ranges
bytes
cf-ray
65cc46838e855369-FRA
expires
Wed, 20 Apr 2022 06:26:20 GMT
HI_XiYsKILxRpg3hIP6sJ7fM7PqtzsjDs-cq.woff2
fonts.gstatic.com/s/sourcecodepro/v14/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/sourcecodepro/v14/HI_XiYsKILxRpg3hIP6sJ7fM7PqtzsjDs-cq.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Source+Code+Pro:500&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f29cd3a2bdcacf9f9f7285c9b74d89f55634f4d43752d81a48914afa7442eb66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www.ired.team
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 08 Jun 2021 18:38:54 GMT
x-content-type-options
nosniff
age
84259
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13540
x-xss-protection
0
last-modified
Wed, 24 Mar 2021 17:51:24 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 08 Jun 2022 18:38:54 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHcll2Cw7RXzll00Y7%2FScreenshot%20from%202019-02-09%2014-18-32.png
gblobscdn.gitbook.com/
22 KB
22 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHcll2Cw7RXzll00Y7%2FScreenshot%20from%202019-02-09%2014-18-32.png?alt=media&token=db120148-d85d-4401-b8c8-8808844af82e
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fd6ed6532676b92d9ef04191bd606d815b885cdcc9f1acc4c75c67eacacb9bc3

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
cf-cache-status
HIT
age
468433
x-guploader-uploadid
ABg5-UxDoyhO24YzO79MXNr7Pbe05YXkKCOZI-GpwMhX0iuSy6FySceMkSXzrkl-HmoH9qZPpjcocDpzQXuakezXhys
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''Screenshot%20from%202019-02-09%2014-18-32.png
content-type
image/png
content-length
22424
cf-request-id
0a938a66f1000005cc9b258000000001
last-modified
Sat, 09 Feb 2019 14:39:34 GMT
server
cloudflare
etag
"4acb1bda71b8909c495f56e5fcede96a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=kgN2yg==, md5=Sssb2nG4kJxJX1bl/O3pag==
x-goog-generation
1549723174315618
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
22424
x-goog-meta-firebasestoragedownloadtokens
db120148-d85d-4401-b8c8-8808844af82e
accept-ranges
bytes
cf-ray
65cc4684bd0e05cc-FRA
expires
Sat, 04 Jun 2022 07:56:01 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHcnmhsrPaq84QCCXJ%2FScreenshot%20from%202019-02-09%2014-21-02.png
gblobscdn.gitbook.com/
30 KB
30 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHcnmhsrPaq84QCCXJ%2FScreenshot%20from%202019-02-09%2014-21-02.png?alt=media&token=fd127c93-66ab-4d13-b4cc-f61645fbb55e
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
03b0665e307caf691a7e91427ecd157e8037ef3aeb3e73faad928d67ffe55113

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
cf-cache-status
HIT
age
1122098
x-guploader-uploadid
ABg5-UzMDyjUbodnlZ5QiAs9i2oKgMSUyf7csienbS7xglo3Z8fj3hxY5dp0xboRImfXcDwIOFJ4T93xua_fqRfIZ-B5VmnAEA
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''Screenshot%20from%202019-02-09%2014-21-02.png
content-type
image/png
content-length
30696
cf-request-id
0a938a66f2000005ccbb8d0000000001
last-modified
Sat, 09 Feb 2019 14:39:34 GMT
server
cloudflare
etag
"3231dc1793ab392f4969a166550dd56e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=gffoKA==, md5=MjHcF5OrOS9JaaFmVQ3Vbg==
x-goog-generation
1549723174151198
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
30696
x-goog-meta-firebasestoragedownloadtokens
fd127c93-66ab-4d13-b4cc-f61645fbb55e
accept-ranges
bytes
cf-ray
65cc4684bd1305cc-FRA
expires
Fri, 27 May 2022 18:21:36 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHcqSVg0P0r8dBLjpC%2FScreenshot%20from%202019-02-09%2014-21-09.png
gblobscdn.gitbook.com/
37 KB
38 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHcqSVg0P0r8dBLjpC%2FScreenshot%20from%202019-02-09%2014-21-09.png?alt=media&token=0cb494ef-c05f-4b98-9450-9c40d3834c04
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
136ce930cd83f459c9528efa1b255d028476ad4638e9f87eafe7ea6df2795521

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
cf-cache-status
HIT
age
1122098
x-guploader-uploadid
ABg5-UxcwPYtQ8GafUdCqnlO-pFISjaUrnpaESRkIEIeQSDOsdzE69Ro48l5J0UEiZY59uWiqjvPp3ovlU2hk0GC69I
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''Screenshot%20from%202019-02-09%2014-21-09.png
content-type
image/png
content-length
37928
cf-request-id
0a938a66f1000005cc610b1000000001
last-modified
Sat, 09 Feb 2019 14:39:34 GMT
server
cloudflare
etag
"b460d65a660971a5a564b8e0583fcab4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=9e2oyQ==, md5=tGDWWmYJcaWlZLjgWD/KtA==
x-goog-generation
1549723174315835
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
37928
x-goog-meta-firebasestoragedownloadtokens
0cb494ef-c05f-4b98-9450-9c40d3834c04
accept-ranges
bytes
cf-ray
65cc4684bd1705cc-FRA
expires
Fri, 27 May 2022 18:21:36 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHeE3F5dXK_ePCdQJH%2FScreenshot%20from%202019-02-09%2014-28-18.png
gblobscdn.gitbook.com/
6 KB
7 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHeE3F5dXK_ePCdQJH%2FScreenshot%20from%202019-02-09%2014-28-18.png?alt=media&token=682c2b70-15cf-4243-897d-07a50dcb60ce
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3e8a9ea983c768e3924813f0f562c7a0eb02425e282d3d91e64ffd5c0c24e2d8

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
cf-cache-status
HIT
age
885957
x-guploader-uploadid
ABg5-UwV6xPvrK1l2NOld5tsPUz6B1O0ium45T2CAHRxAMfbGvugn7s_fkXM9oYV8uZutTjWXaVOwEZWBEWnR_JqykSYrGzMbg
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''Screenshot%20from%202019-02-09%2014-28-18.png
content-type
image/png
content-length
6335
cf-request-id
0a938a66f1000005ccaaaba000000001
last-modified
Sat, 09 Feb 2019 14:39:34 GMT
server
cloudflare
etag
"3bd8990e69e8b5900d577fcb72e07a74"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=k59gxw==, md5=O9iZDmnotZANV3/LcuB6dA==
x-goog-generation
1549723174278644
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
6335
x-goog-meta-firebasestoragedownloadtokens
682c2b70-15cf-4243-897d-07a50dcb60ce
accept-ranges
bytes
cf-ray
65cc4684bd1a05cc-FRA
expires
Mon, 30 May 2022 11:57:17 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHeGTSUXeuBes1DUA8%2FScreenshot%20from%202019-02-09%2014-27-54.png
gblobscdn.gitbook.com/
93 KB
93 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHeGTSUXeuBes1DUA8%2FScreenshot%20from%202019-02-09%2014-27-54.png?alt=media&token=69793e54-eccd-4592-9c37-dd3953c91345
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
34d111f20960b8fbe1ebf0be28b3a67ae36c01e0dfd7a22ab3ebdfda3a40dbfc

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
cf-cache-status
HIT
age
1122098
x-guploader-uploadid
ABg5-UwBH6hDJgQF5Pt8vxtkN60u6-FM505ieBjb9u_nL0dYVZwqieiM48e0pgCm4N1npiZBgoBsk1oesS936Mtw3_cwgcpsig
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''Screenshot%20from%202019-02-09%2014-27-54.png
content-type
image/png
content-length
94853
cf-request-id
0a938a66f4000005cca398d000000001
last-modified
Sat, 09 Feb 2019 14:39:34 GMT
server
cloudflare
etag
"44ed3e6f94392a62fd069e1273546e2d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=z8GiyQ==, md5=RO0+b5Q5KmL9Bp4Sc1RuLQ==
x-goog-generation
1549723174933629
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
94853
x-goog-meta-firebasestoragedownloadtokens
69793e54-eccd-4592-9c37-dd3953c91345
accept-ranges
bytes
cf-ray
65cc4684bd1b05cc-FRA
expires
Fri, 27 May 2022 18:21:36 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LYHn7bhLyxbOjA7EU9M%2F-LYHo8SqVwHexwGHFRIn%2FScreenshot%20from%202019-02-09%2015-11-36.png
gblobscdn.gitbook.com/
47 KB
47 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LYHn7bhLyxbOjA7EU9M%2F-LYHo8SqVwHexwGHFRIn%2FScreenshot%20from%202019-02-09%2015-11-36.png?alt=media&token=82b495d7-34fe-41c1-a296-8f802dbb660f
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eb470d0e44fc9ea031dff6615f4dcf8f460cc71c4603dbe9abd583cc3bb034cf

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
cf-cache-status
HIT
age
370285
x-guploader-uploadid
ABg5-UwXrcH-ofp9NqenCrHjjnz6v25b-opKu34lvMYa0S5oZJSooMW9hwF-IwsVaLigNtNtdAfLH1Qi653cej5BhrU2fO0cEw
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''Screenshot%20from%202019-02-09%2015-11-36.png
content-type
image/png
content-length
47701
cf-request-id
0a938a66f1000005cc5ea53000000001
last-modified
Sat, 09 Feb 2019 15:13:51 GMT
server
cloudflare
etag
"d86aebfc9eb6e46dc89fbc8e76a5f171"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=30HShA==, md5=2Grr/J625G3In7yOdqXxcQ==
x-goog-generation
1549725231705609
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
47701
x-goog-meta-firebasestoragedownloadtokens
82b495d7-34fe-41c1-a296-8f802dbb660f
accept-ranges
bytes
cf-ray
65cc4684bd1c05cc-FRA
expires
Sun, 05 Jun 2022 11:11:49 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHfiPA13UOQiYsWHVT%2FScreenshot%20from%202019-02-09%2014-34-44.png
gblobscdn.gitbook.com/
86 KB
87 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LYHcIL_R4k6YNEXjoex%2F-LYHfiPA13UOQiYsWHVT%2FScreenshot%20from%202019-02-09%2014-34-44.png?alt=media&token=1b755cd8-e2d9-45e4-9b25-72f58955065c
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8beb5465b2abd6a7b77922b8ee2db26b06cac44607544aa47a07aa5501158969

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
cf-cache-status
HIT
age
370285
x-guploader-uploadid
ABg5-UxE9DrmH_e5I8Ivu3PGq7lHIlsoK5PjRZGUivcMQk09ixW4kQX6XiW2hoRseCpoqoQ-SGfM0PooAvxY_0xYOAQ
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''Screenshot%20from%202019-02-09%2014-34-44.png
content-type
image/png
content-length
88354
cf-request-id
0a938a66f5000005cc82074000000001
last-modified
Sat, 09 Feb 2019 14:39:34 GMT
server
cloudflare
etag
"c61020e42bbd137a5a629ad410262cf7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=LOeygg==, md5=xhAg5Cu9E3paYprUECYs9w==
x-goog-generation
1549723174810591
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
88354
x-goog-meta-firebasestoragedownloadtokens
1b755cd8-e2d9-45e4-9b25-72f58955065c
accept-ranges
bytes
cf-ray
65cc4684bd2505cc-FRA
expires
Sun, 05 Jun 2022 11:11:49 GMT
logger.min.js
cdn.lr-ingest.io/
715 KB
133 KB
Script
General
Full URL
https://cdn.lr-ingest.io/logger.min.js
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::ac43:a339 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5d169e56ec2b87136f8b1e95969029738d6ca5c0cc7abd82a01017ad908ea05f
Security Headers
Name Value
Strict-Transport-Security max-age=31556926

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
content-encoding
br
vary
x-fh-requested-host, accept-encoding
cf-cache-status
HIT
nel
{"report_to":"cf-nel","max_age":604800}
age
238
x-cache
MISS
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
cf-request-id
0a938a67c900001f15651f7000000001
x-served-by
cache-fra19183-FRA
last-modified
Tue, 08 Jun 2021 20:24:04 GMT
server
cloudflare
x-timer
S1623183887.152288,VS0,VE360
etag
W/"e14844c158c1f9def91ea9912403290f323067a74c853c45571aec1e5546eaaa"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31556926
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=d9EBROQ%2FOsh%2FXgX6EeiRf5h%2FkBLtIjn2Xc44vL%2B%2BGroABWJ8hWmfC83frvE4K%2Bqj07%2B1IdT4w847UGh0NGxc71xJBpAvXx%2BKcScfnvsz6QclS2xLCW19Vn0ZvCNNcjlvtnSOooqFMFa%2FlQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=14400
cf-ray
65cc468609d31f15-FRA
x-cache-hits
0
__session
app.gitbook.com/
52 B
691 B
Fetch
General
Full URL
https://app.gitbook.com/__session?proposed=197ebd81-63b5-4e06-ad11-668c70b11a07R
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
00c2bc111f5a5209ddf23e11cdd243f127379f857eeeab5b12fcfd21b2f5e14c

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:14 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-magic-hash
590b4fe02dc55aa9fde6dfdbc1a33d82273fc9c6a576984b78f97aca99a7ec32
x-powered-by
Express
x-cache
MISS
x-release
gitbook-28427-6.25.11
cf-request-id
0a938a69d9000005cc589f1000000001
access-control-allow-origin
https://www.ired.team
server
cloudflare
etag
W/"34-51CRqQyGwgM/dzCA+t5a64Jojmk"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin, Accept-Encoding
content-type
application/json; charset=utf-8
via
no cache
x-cloud-trace-context
5a5a7b345aa691a018c661ff2c23d160
cache-control
private
access-control-allow-credentials
true
function-execution-id
cu5abi1hfa6w
cf-ray
65cc4689598f05cc-FRA
expires
Wed, 09 Jun 2021 18:03:14 GMT
1dde2b75-3a27-40f6-bf68-76c67f8ff9a4
https://www.ired.team/
406 KB
0
Other
General
Full URL
blob:https://www.ired.team/1dde2b75-3a27-40f6-bf68-76c67f8ff9a4
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
717a1661d13c1466b8ff0b54c49c88b83cd830eac5339bc18dfe09ae2bec36a8

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Length
416100
/
www.gitbook.com/__amp/
7 B
184 B
XHR
General
Full URL
https://www.gitbook.com/__amp/
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aee408847d35e44e99430f0979c3357b85fe8dbb4535a494301198adbee85f27
Security Headers
Name Value
Strict-Transport-Security max-age=15768000

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 09 Jun 2021 18:03:16 GMT
cf-cache-status
DYNAMIC
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, POST
content-type
text/html;charset=utf-8
access-control-allow-origin
*
strict-transport-security
max-age=15768000
cf-ray
65cc468efe355369-FRA
content-length
7
cf-request-id
0a938a6d5b000053697c2af000000001
analytics.js
www.google-analytics.com/
48 KB
19 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:831::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2cb09c7b3e19bfc41743ca3624ef81c3258d56525647feac76aa757e0292627a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 09 Apr 2021 23:59:54 GMT
server
Golfe2
age
1463
date
Wed, 09 Jun 2021 17:38:52 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19569
expires
Wed, 09 Jun 2021 19:38:52 GMT
7f9239ce726764aa22093884902e018d.svg
gstatic.gitbook.com/images/
2 KB
1 KB
Image
General
Full URL
https://gstatic.gitbook.com/images/7f9239ce726764aa22093884902e018d.svg
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
863db76a201dedb75ccb6392a1664138cfb5c60d71e2073056db22ca39a56fec

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:15 GMT
content-encoding
gzip
cf-cache-status
HIT
age
5728287
x-guploader-uploadid
ABg5-Uwp2ZHpfP2KRh3gmr5OfeDUxp0R7u-PLsf10qcUQXhVLjI--w_PdPdPrcA3PFb9bG3JCWQm3A0kt0wXHHc68KoZV03s2A
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
image/svg+xml
cf-request-id
0a938a6d680000062930991000000001
last-modified
Fri, 19 Mar 2021 17:17:25 GMT
server
cloudflare
etag
W/"7f9239ce726764aa22093884902e018d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=VnuT0A==, md5=f5I5znJnZKoiCTiEkC4BjQ==
x-goog-generation
1616174245138502
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
2137
cf-ray
65cc468efda20629-FRA
expires
Mon, 04 Apr 2022 10:51:47 GMT
collect
www.google-analytics.com/j/
2 B
22 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j90&a=820161611&t=pageview&_s=1&dl=https%3A%2F%2Fwww.ired.team%2Foffensive-security-experiments%2Factive-directory-kerberos-abuse%2Fdump-password-hashes-from-domain-controller-with-dcsync&dp=%2Foffensive-security-experiments%2Factive-directory-kerberos-abuse%2Fdump-password-hashes-from-domain-controller-with-dcsync&ul=en-us&de=UTF-8&dt=DCSync%3A%20Dump%20Password%20Hashes%20from%20Domain%20Controller%20-%20Red%20Teaming%20Experiments&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEDAAEABAAAAAC~&jid=171604701&gjid=454309187&cid=1329303757.1623261796&tid=UA-57505611-10&_gid=1514101993.1623261796&_r=1&_slc=1&cd1=-LFEMnER3fywgFHoroYn&cd2=-LFEMnEQwqZOY6DtfrzY&cd3=-MbMRjQwLSFD3ErZcYXE&cd4=master&cd5=-LYHcKlvPpvC2Ly98FpQ&z=106106643
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:831::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a048e640908046be06e00eab37742b5d5ff80964af58cfd22f7cb2de4dfe375f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 09 Jun 2021 18:03:15 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.ired.team
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/j/
2 B
22 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j90&a=820161611&t=pageview&_s=1&dl=https%3A%2F%2Fwww.ired.team%2Foffensive-security-experiments%2Factive-directory-kerberos-abuse%2Fdump-password-hashes-from-domain-controller-with-dcsync&dp=%2Foffensive-security-experiments%2Factive-directory-kerberos-abuse%2Fdump-password-hashes-from-domain-controller-with-dcsync&ul=en-us&de=UTF-8&dt=DCSync%3A%20Dump%20Password%20Hashes%20from%20Domain%20Controller%20-%20Red%20Teaming%20Experiments&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEDAAEABAAAAAC~&jid=1883201520&gjid=492946747&cid=1329303757.1623261796&tid=UA-128974775-1&_gid=1514101993.1623261796&_r=1&_slc=1&z=1896055229
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:831::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a048e640908046be06e00eab37742b5d5ff80964af58cfd22f7cb2de4dfe375f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 09 Jun 2021 18:03:15 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.ired.team
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT
.lp
gitbook-28427.firebaseio.com/ Frame 72C1
421 B
663 B
Script
General
Full URL
https://gitbook-28427.firebaseio.com/.lp?start=t&ser=59569926&cb=1&v=5
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
e8315b10203fc52936400681f77766b877d84b72af65d4f9dcc29e831f6c60c6
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 09 Jun 2021 18:03:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
421
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-230.firebaseio.com/ Frame 909C
419 B
648 B
Document
General
Full URL
https://s-usc1c-nss-230.firebaseio.com/.lp?dframe=t&id=173099&pw=i7cvQ0nM3c&ns=gitbook-28427
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
303751efba8be6c0a1996bbb4870d1e682fdc76b3098fbc16caa197d94247067
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Host
s-usc1c-nss-230.firebaseio.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync

Response headers

Server
nginx
Date
Wed, 09 Jun 2021 18:03:18 GMT
Content-Type
text/html; charset=utf-8
Content-Length
419
Connection
keep-alive
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
.lp
s-usc1c-nss-230.firebaseio.com/ Frame 72C1
15 B
256 B
Script
General
Full URL
https://s-usc1c-nss-230.firebaseio.com/.lp?id=173099&pw=i7cvQ0nM3c&ser=21127193&ns=gitbook-28427
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
416ebdae1319a43b48e3caf0a24100ab786aa6432e276fb735da780aa435b300
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 09 Jun 2021 18:03:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
15
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-230.firebaseio.com/ Frame 72C1
58 B
299 B
Script
General
Full URL
https://s-usc1c-nss-230.firebaseio.com/.lp?id=173099&pw=i7cvQ0nM3c&ser=21127194&ns=gitbook-28427&seg0=0&ts0=1&d0=eyJ0IjoiZCIsImQiOnsiciI6MSwiYSI6InMiLCJiIjp7ImMiOnsic2RrLmpzLjctMTQtMSI6MX19fX0.
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
30bd0120e57f70174a17629a1703bb0d29bd1660f244aa45d0542637d5b960d7
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 09 Jun 2021 18:03:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
58
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-230.firebaseio.com/ Frame 72C1
58 B
299 B
Script
General
Full URL
https://s-usc1c-nss-230.firebaseio.com/.lp?id=173099&pw=i7cvQ0nM3c&ser=21127195&ns=gitbook-28427&seg0=1&ts0=1&d0=eyJ0IjoiZCIsImQiOnsiciI6MiwiYSI6InEiLCJiIjp7InAiOiIvc3BhY2VzLy1MRkVNbkVSM2Z5d2dGSG9yb1luL3VzZXJQYWdlUmF0aW5ncy8tTFlIY0tsdlBwdkMyTHk5OEZwUS8tTWJreTI0RnhQdnFoN1lpOUJ5VCIsImgiOiIifX19&seg1=2&ts1=1&d1=eyJ0IjoiZCIsImQiOnsiciI6MywiYSI6Im0iLCJiIjp7InAiOiIvZW1iZWRzL2h0dHA6JTJGJTJGd3d3JTJFaGFybWoweSUyRW5ldCUyRmJsb2clMkZyZWR0ZWFtaW5nJTJGYWJ1c2luZy1hY3RpdmUtZGlyZWN0b3J5LXBlcm1pc3Npb25zLXdpdGgtcG93ZXJ2aWV3JTJGIiwiZCI6eyJvdXRkYXRlZCI6dHJ1ZX19fX0.&seg2=3&ts2=1&d2=eyJ0IjoiZCIsImQiOnsiciI6NCwiYSI6Im0iLCJiIjp7InAiOiIvZW1iZWRzL2h0dHBzOiUyRiUyRmJsb2clMkVzdGVhbHRoYml0cyUyRWNvbSUyRmV4dHJhY3RpbmctdXNlci1wYXNzd29yZC1kYXRhLXdpdGgtbWltaWthdHotZGNzeW5jJTJGIiwiZCI6eyJvdXRkYXRlZCI6dHJ1ZX19fX0.&seg3=4&ts3=1&d3=eyJ0IjoiZCIsImQiOnsiciI6NSwiYSI6Im0iLCJiIjp7InAiOiIvZW1iZWRzL2h0dHBzOiUyRiUyRm1lZGl1bSUyRWNvbSUyRkBqc2VjdXJpdHkxMDElMkZzeW5jaW5nLWludG8tdGhlLXNoYWRvd3MtYmJkNjU2ZGQxNGM4IiwiZCI6eyJvdXRkYXRlZCI6dHJ1ZX19fX0.
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
01fe65d4fd93c66f51043f540156e23f6c69ef7ca0b6a0484bb063888989eb0e
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 09 Jun 2021 18:03:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
58
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-230.firebaseio.com/ Frame 72C1
146 B
388 B
Script
General
Full URL
https://s-usc1c-nss-230.firebaseio.com/.lp?id=173099&pw=i7cvQ0nM3c&ser=21127196&ns=gitbook-28427
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
1297df6a08a9d468838d7128f03eb06fb6194048cfeb74aa28806225165fb88f
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 09 Jun 2021 18:03:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
146
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-230.firebaseio.com/ Frame 72C1
47 B
288 B
Script
General
Full URL
https://s-usc1c-nss-230.firebaseio.com/.lp?id=173099&pw=i7cvQ0nM3c&ser=21127197&ns=gitbook-28427
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
431270143e9fb062562e977b4e3a627d721bfd1a97e45e87794e2515425f3f60
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 09 Jun 2021 18:03:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
47
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-230.firebaseio.com/ Frame 72C1
38 B
279 B
Script
General
Full URL
https://s-usc1c-nss-230.firebaseio.com/.lp?id=173099&pw=i7cvQ0nM3c&ser=21127198&ns=gitbook-28427&seg0=5&ts0=1&d0=eyJ0IjoiYyIsImQiOnsidCI6Im4iLCJkIjp7fX19
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
8e9bd0e2d3d483ebc55071a08a6b569aac5da3a6b7d473c4dd7f0288030f8dae
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 09 Jun 2021 18:03:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
38
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
chunk.966.9bcdd26c.js
gstatic.gitbook.com/js/
1 MB
135 KB
Script
General
Full URL
https://gstatic.gitbook.com/js/chunk.966.9bcdd26c.js
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.f142f50e.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5b08085db82bdd556abf8dfe2c049e433274cd77fe15cadaa1437af9b5e928eb

Request headers

Referer
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/dump-password-hashes-from-domain-controller-with-dcsync
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Jun 2021 18:03:20 GMT
content-encoding
gzip
cf-cache-status
HIT
age
5538646
cf-polished
origSize=1540766
x-guploader-uploadid
ABg5-UwpHqO3lEk5fGY24xMrxzKaUmsztOxRaJLPxdyRgqAeFBO9HlwfZkZiK-VlxtbNPv4e6b89Z03c6mD4LNmS6aO9oovXkg
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
application/javascript
cf-request-id
0a938a7e6f0000062983986000000001
last-modified
Fri, 19 Mar 2021 17:17:25 GMT
server
cloudflare
etag
W/"1ee0a04f04f79506addc6f9cc9ade2c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=6ui4QQ==, md5=HuCgTwT3lQat3G+cya3iwA==
x-goog-generation
1616174245205973
access-control-allow-origin
*
expires
Wed, 06 Apr 2022 15:32:34 GMT
cache-control
public, max-age=31536000
x-goog-stored-content-length
1540766
cf-ray
65cc46aa4a340629-FRA
cf-bgj
minify

Verdicts & Comments Add Verdict or Comment

36 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| GITBOOK_STATE object| __LOADABLE_LOADED_CHUNKS__ object| GitBook object| __SENTRY__ function| _lrMutationObserver object| __SDKCONFIG__ number| 2f1acc6c3a606b082e5eef5e54414ffb function| Intercom function| Mousetrap function| setImmediate function| clearImmediate object| Prism object| __algolia object| regeneratorRuntime function| _LRLogger boolean| _lr_loaded boolean| __isReactDndBackendSetUp string| GoogleAnalyticsObject function| ga object| google_tag_data object| gaplugins object| gaGlobal object| gaData function| pLPCommand1 function| pRTLPCB1

5 Cookies

Domain/Path Name / Value
.ired.team/ Name: _gat_customTracker
Value: 1
.ired.team/ Name: _gat_space
Value: 1
.ired.team/ Name: _gid
Value: GA1.2.1514101993.1623261796
.ired.team/ Name: _ga
Value: GA1.2.1329303757.1623261796
.ired.team/ Name: amplitude_id_fef1e872c952688acd962d30aa545b9eired.team
Value: eyJkZXZpY2VJZCI6IjE5N2ViZDgxLTYzYjUtNGUwNi1hZDExLTY2OGM3MGIxMWEwN1IiLCJ1c2VySWQiOm51bGwsIm9wdE91dCI6ZmFsc2UsInNlc3Npb25JZCI6MTYyMzI2MTc5NTEyMiwibGFzdEV2ZW50VGltZSI6MTYyMzI2MTc5NTY1MiwiZXZlbnRJZCI6MSwiaWRlbnRpZnlJZCI6MCwic2VxdWVuY2VOdW1iZXIiOjF9

1 Console Messages

Source Level URL
Text
console-api log URL: https://gstatic.gitbook.com/js/111.f142f50e.js(Line 1)
Message:
Application ready

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

app.gitbook.com
blog.stealthbits.com
cdn.lr-ingest.io
fonts.googleapis.com
fonts.gstatic.com
gblobscdn.gitbook.com
gitbook-28427.firebaseio.com
gstatic.gitbook.com
ired.team
lh5.googleusercontent.com
miro.medium.com
polyfill.io
s-usc1c-nss-230.firebaseio.com
unpkg.com
www.gitbook.com
www.google-analytics.com
www.ired.team
www.stealthbits.com
209.59.132.164
2600:1901:0:94b6::
2606:4700:3032::6815:11bb
2606:4700:3033::ac43:a339
2606:4700:7::a29f:9904
2606:4700::6810:7aaf
2606:4700::6812:86f
2606:4700::6812:91
2606:4700::6812:96f
2a00:1450:4001:802::200a
2a00:1450:4001:809::2003
2a00:1450:4001:829::2001
2a00:1450:4001:831::200e
2a04:4e42:600::621
72.52.228.51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