URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Submission: On December 20 via manual from US

Summary

This website contacted 23 IPs in 4 countries across 18 domains to perform 55 HTTP transactions. The main IP is 151.101.1.132, located in San Francisco, United States and belongs to FASTLY - Fastly, US. The main domain is motherboard.vice.com.
TLS certificate: Issued by GlobalSign CloudSSL CA - SHA256 - G3 on November 7th 2018. Valid for: 10 months.
This is the only time motherboard.vice.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
6 151.101.1.132 54113 (FASTLY)
10 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
6 151.101.0.175 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
1 151.101.192.175 54113 (FASTLY)
1 1 34.235.177.68 14618 (AMAZON-AES)
2 2a03:2880:f11... 32934 (FACEBOOK)
3 143.204.101.125 16509 (AMAZON-02)
1 35.177.117.159 16509 (AMAZON-02)
1 143.204.101.26 16509 (AMAZON-02)
1 2 23.57.19.23 16625 (AKAMAI-AS)
1 52.47.40.236 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 2a00:1450:400... 15169 (GOOGLE)
6 172.217.18.98 15169 (GOOGLE)
1 54.191.154.91 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.201.154.11 14618 (AMAZON-AES)
1 54.228.181.107 16509 (AMAZON-02)
55 23
Domain Requested by
10 cdn.ampproject.org motherboard.vice.com
cdn.ampproject.org
7 cdn.krxd.net cdn.ampproject.org
6 tpc.googlesyndication.com cdn.ampproject.org
6 securepubads.g.doubleclick.net cdn.ampproject.org
4 vice-web-statics-cdn.vice.com motherboard.vice.com
3 cloudapi.imrworldwide.com motherboard.vice.com
2 amp-error-reporting.appspot.com cdn.ampproject.org
2 sb.scorecardresearch.com 1 redirects motherboard.vice.com
2 www.facebook.com motherboard.vice.com
1 beacon.krxd.net
1 ping.chartbeat.net
1 pagead2.googlesyndication.com motherboard.vice.com
1 stats.g.doubleclick.net motherboard.vice.com
1 www.google-analytics.com 1 redirects
1 api.segment.io motherboard.vice.com
1 ampcid.google.de cdn.ampproject.org
1 ampcid.google.com cdn.ampproject.org
1 prof.estat.com motherboard.vice.com
1 certify-amp.alexametrics.com motherboard.vice.com
1 pixel.quantserve.com motherboard.vice.com
1 uaid-linkage.imrworldwide.com 1 redirects
1 www.googletagmanager.com cdn.ampproject.org
1 adservice.google.com cdn.ampproject.org
1 video-images.vice.com motherboard.vice.com
1 motherboard.vice.com
55 25
Subject Issuer Validity Valid
a2.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-11-07 -
2019-08-28
10 months crt.sh
misc-sni.google.com
Google Internet Authority G3
2018-12-04 -
2019-02-26
3 months crt.sh
*.google.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.c.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-10-09 -
2019-09-27
a year crt.sh
*.google-analytics.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2017-12-15 -
2019-03-22
a year crt.sh
*.imrworldwide.com
DigiCert SHA2 Secure Server CA
2018-02-15 -
2019-07-11
a year crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2018-10-16 -
2019-10-21
a year crt.sh
certify-amp.alexametrics.com
Amazon
2018-09-05 -
2019-10-05
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.estat.com
Amazon
2018-08-08 -
2019-09-08
a year crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2018-12-04 -
2019-02-26
3 months crt.sh
*.segment.io
DigiCert SHA2 Secure Server CA
2018-05-10 -
2019-07-26
a year crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.appspot.com
Google Internet Authority G3
2018-12-04 -
2019-02-26
3 months crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2018-01-02 -
2019-01-02
a year crt.sh
*.krxd.net
Go Daddy Secure Certificate Authority - G2
2017-06-12 -
2019-07-11
2 years crt.sh

This page contains 6 frames:

Primary Page: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Frame ID: A0808DB94ACC3967F0D585CF1A74477E
Requests: 51 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Frame ID: 6A42ADA954D6850B7149D8C6F8F0E2D9
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Frame ID: 5B3756F87CADCE87049EDE0C7EE894DF
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Frame ID: A42E6AA8E3F218228758ADA59A81CA1E
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Frame ID: 33A94CA281D6A62A8ACFA0C0F75917A8
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Frame ID: 522D0980785D73A473A0B855ED8EE8D8
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /.*Varnish/i

Overall confidence: 100%
Detected patterns
  • env /^gaGlobal$/i

Page Statistics

55
Requests

100 %
HTTPS

43 %
IPv6

18
Domains

25
Subdomains

23
IPs

4
Countries

5809 kB
Transfer

7536 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 25
  • https://uaid-linkage.imrworldwide.com/cgi-bin/gn?prd=session&c13=asid,PC3E11FB8-EF45-4D94-A393-1BE694E98B4F&sessionId=amp-3x8dEKUZxxqBUH9MpXjgMA_9172&pingtype=4&enc=false&c61=createtm,1545313979029&rnd=0.8539656771940436 HTTP 302
  • https://www.facebook.com/brandlift.php?sessionId=amp-3x8dEKUZxxqBUH9MpXjgMA_9172&advertiser_id=amp-3x8dEKUZxxqBUH9MpXjgMA_9172
Request Chain 29
  • https://sb.scorecardresearch.com/b?c1=2&c2=8568956&cs_pv=9172&c12=amp-84E4Z8KiMrDimZ4qt35YqQ&rn=0.02077417981520613&c8=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&c7=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&c9=&cs_c7amp=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&comscorekw=amp HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=8568956&cs_pv=9172&c12=amp-84E4Z8KiMrDimZ4qt35YqQ&rn=0.02077417981520613&c8=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&c7=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&c9=&cs_c7amp=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&comscorekw=amp
Request Chain 41
  • https://www.google-analytics.com/r/collect?v=1&_v=a1&gtm=2agbc0GTM-P9JRJM9&ds=AMP&aip=true&_s=4&dt=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&sr=1600x1200&_utmht=1545313979075&cid=amp-pMmJfo1Ymi58x3ighbQ-IA&tid=UA-599058-191&dl=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&dr=&sd=24&ul=en-us&de=UTF-8&jid=0.30644462758560187&t=pageview&_r=1&a=9172&z=0.2541533254562651&cd1=5c12c1022f135f0006f9c3ee&cd2=2fa%7Ccybersecurity%7Cemail%7Cemail-hack%7Cgmail%7Cgovernment-hackers%7Cphishing%7Cspear-phishing%7Ctwo-factor-authentication%7Cyahoo&cd3=false&cd6=amp-short-form&cd7=joseph-cox%7Cjason-koebler&cd10=en_us&cd11=bje3kw&cd12=null&cd13=null&cd15=&cd16=&cd17=&cd18=1158&cd22=motherboard.vice.com HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-599058-191&cid=amp-pMmJfo1Ymi58x3ighbQ-IA&jid=0.30644462758560187&_v=a1&z=0.2541533254562651

55 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
motherboard.vice.com/amp/en_us/article/bje3kw/
71 KB
16 KB
Document
General
Full URL
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.132 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
5902abb7b2cf87ff048c0c4517952742af23c125b26b2ac0579027b79cb5b5d4
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.vice.com *.viceland.com viceland.com viceland.nl vicesports.nl vicemoney.nl vicebelgique.com
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
motherboard.vice.com
:scheme
https
:path
/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
content-type
text/html; charset=utf-8
pragma
public
cache-control
public, max-age=303, must-revalidate
expires
Wed, 19 Dec 2018 22:20:51 GMT
etag
W/"11b30-RLcU2ApUtJi90ymnlRWpzw"
content-encoding
gzip
via
1.1 varnish 1.1 varnish
x-backend
23.235.46.40
accept-ranges
bytes
date
Thu, 20 Dec 2018 13:52:58 GMT
age
5
x-served-by
cache-iad2140-IAD, cache-hhn1529-HHN
x-cache
HIT, MISS
x-cache-hits
1, 0
x-timer
S1545313978.274061,VS0,VE89
vary
Accept-Encoding
x-geoip-country-code
DE
x-geoip-region-code
HE
set-cookie
Vice-H2-Push-Sig=2018121806; Secure; HttpOnly X-GeoIP-Country-Code=DE; path=/; X-GeoIP-Region-Code=HE; path=/;
strict-transport-security
max-age=31536000; includeSubDomains
x-xss-protection
1; mode=block
x-content-type-options
nosniff
content-security-policy
frame-ancestors 'self' *.vice.com *.viceland.com viceland.com viceland.nl vicesports.nl vicemoney.nl vicebelgique.com
content-length
15367
v0.js
cdn.ampproject.org/
263 KB
71 KB
Script
General
Full URL
https://cdn.ampproject.org/v0.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
14e560e33e4a451a33ec7145a45188e58d99746661b67ecf46467d809beb5bba
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
72037
x-xss-protection
1; mode=block
server
sffe
etag
"04fb7bf2365b71eb"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=3000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
amp-analytics-0.1.js
cdn.ampproject.org/v0/
129 KB
35 KB
Script
General
Full URL
https://cdn.ampproject.org/v0/amp-analytics-0.1.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
23ac3eca62d2a4bfe2fef599718c13270dee17223eb0bb496d81be30e0bbabe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
35998
x-xss-protection
1; mode=block
server
sffe
etag
"bf19948e2fb1adeb"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=604800, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
amp-ad-0.1.js
cdn.ampproject.org/v0/
54 KB
16 KB
Script
General
Full URL
https://cdn.ampproject.org/v0/amp-ad-0.1.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
03cec191223c37c73bf9a6ff34661bc9b764e44920dc4c5ff32ecde97cea8780
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
16505
x-xss-protection
1; mode=block
server
sffe
etag
"82c55c0ed2770a7f"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=604800, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
amp-iframe-0.1.js
cdn.ampproject.org/v0/
21 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/v0/amp-iframe-0.1.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b0f4da288ff41ecc280975de8524c4d61f3b09b88611dc67d8052d44f02d5195
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
7626
x-xss-protection
1; mode=block
server
sffe
etag
"0bb65b54097b1f9c"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=604800, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
amp-twitter-0.1.js
cdn.ampproject.org/v0/
19 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/v0/amp-twitter-0.1.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
2c7ad26ffefe39c248cf31060660176071ca7d67bb699d5ec26f37f4b52b892f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
6600
x-xss-protection
1; mode=block
server
sffe
etag
"a94fa804938323ef"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=604800, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
amp-facebook-0.1.js
cdn.ampproject.org/v0/
14 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/v0/amp-facebook-0.1.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a1048f53cac7b93fcc3687c875bd77b459387ce646f5a6f588f5263a401361c8
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
5571
x-xss-protection
1; mode=block
server
sffe
etag
"05530b44ae3247dd"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=604800, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
amp-instagram-0.1.js
cdn.ampproject.org/v0/
5 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/v0/amp-instagram-0.1.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
7aef13e388a67fc4943990c1237a6043014f2d0f6af8119407f9e2903621646b
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
1843
x-xss-protection
1; mode=block
server
sffe
etag
"77eb411f247802f9"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=604800, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
amp-social-share-0.1.js
cdn.ampproject.org/v0/
14 KB
5 KB
Script
General
Full URL
https://cdn.ampproject.org/v0/amp-social-share-0.1.js
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a9fffcb3d78828e0c2e35e001ac1f066fd999e21e66c9ad5d1db104a01b4bcec
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
vary
Accept-Encoding
status
200
date
Thu, 20 Dec 2018 13:52:58 GMT
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
5033
x-xss-protection
1; mode=block
server
sffe
etag
"2f500c4f6fcd5fb5"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
cache-control
private, max-age=604800, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
x-content-type-options
nosniff
expires
Thu, 20 Dec 2018 13:52:58 GMT
(id%3ACalvertMTBold)(name%3ACalvertMTBold).woff2
vice-web-statics-cdn.vice.com/fonts/motherboard/
18 KB
19 KB
Font
General
Full URL
https://vice-web-statics-cdn.vice.com/fonts/motherboard/(id%3ACalvertMTBold)(name%3ACalvertMTBold).woff2
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.132 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
50993bb12bfe689de12d2e0c41dc16237adb35099f819f4c328e17ed461be11f

Request headers

:path
/fonts/motherboard/(id%3ACalvertMTBold)(name%3ACalvertMTBold).woff2
pragma
no-cache
origin
https://motherboard.vice.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
vice-web-statics-cdn.vice.com
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:52:58 GMT
via
1.1 varnish 1.1 varnish
x-backend
23.235.46.31
age
248484
x-geoip-region-code
HE
x-cache
HIT, HIT
status
200
access-control-max-age
3000
x-cache-hits
1, 337
content-length
18500
x-amz-id-2
LwfTyZZhw1gfjTq3ODCn4Pof6c1YVW4WdnzRxmBMQ5UpLJ6si3kwAEg5QbTsCuJACipwm+44SGc=
x-served-by
cache-iad2131-IAD, cache-hhn1520-HHN
last-modified
Mon, 19 Nov 2018 16:12:24 GMT
server
AmazonS3
x-timer
S1545313979.579625,VS0,VE0
etag
"b9718a1cfbf3a6cae04565e34e0516a9"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
access-control-allow-methods
GET, HEAD
x-amz-request-id
A0B2CA1C8AF78C10
access-control-allow-origin
*
cache-control
max-age=600
accept-ranges
bytes
content-type
application/font-woff2
x-geoip-country-code
DE
(id%3ATazuganeGothic)(name%3ATazuganeGothic)(langs%3Aja).otf
vice-web-statics-cdn.vice.com/fonts/motherboard/
3 MB
3 MB
Font
General
Full URL
https://vice-web-statics-cdn.vice.com/fonts/motherboard/(id%3ATazuganeGothic)(name%3ATazuganeGothic)(langs%3Aja).otf
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.132 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f9562f3ead8bf46d641b426bc555d28750fc5172ad61dfd153dceb13c0fac322

Request headers

:path
/fonts/motherboard/(id%3ATazuganeGothic)(name%3ATazuganeGothic)(langs%3Aja).otf
pragma
no-cache
origin
https://motherboard.vice.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
vice-web-statics-cdn.vice.com
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:52:58 GMT
content-encoding
gzip
x-backend
23.235.46.41
age
248451
x-geoip-region-code
HE
x-cache
HIT, HIT
status
200
access-control-max-age
3000
x-cache-hits
1, 37
content-length
2663546
x-amz-id-2
OPa+6mIkuD/ax1IpKabON4myDCF3+90xNqR8xf93L3lFdgf0Va0MGZrLeDTvb6+8XMY/2OqKPtw=
x-served-by
cache-iad2141-IAD, cache-hhn1520-HHN
access-control-allow-origin
*
last-modified
Mon, 19 Nov 2018 16:12:24 GMT
server
AmazonS3
x-timer
S1545313979.579645,VS0,VE3
etag
"7755dfbc8dfdf9a6e339f6912f7badee"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET, HEAD
x-amz-request-id
58759AA06DA3559C
via
1.1 varnish 1.1 varnish
cache-control
max-age=600
accept-ranges
bytes
content-type
application/vnd.oasis.opendocument.formula-template
x-geoip-country-code
DE
(id%3ATazuganeGothicBold)(name%3ATazuganeGothic)(weight%3Abold)(langs%3Aja).otf
vice-web-statics-cdn.vice.com/fonts/motherboard/
3 MB
3 MB
Font
General
Full URL
https://vice-web-statics-cdn.vice.com/fonts/motherboard/(id%3ATazuganeGothicBold)(name%3ATazuganeGothic)(weight%3Abold)(langs%3Aja).otf
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.132 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
85931e71efb6ad1af39701ff1d6bcb1f2b609e4d2b2909df508abce2635c5d41

Request headers

:path
/fonts/motherboard/(id%3ATazuganeGothicBold)(name%3ATazuganeGothic)(weight%3Abold)(langs%3Aja).otf
pragma
no-cache
origin
https://motherboard.vice.com
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
vice-web-statics-cdn.vice.com
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:52:58 GMT
content-encoding
gzip
x-backend
23.235.46.39
age
248452
x-geoip-region-code
HE
x-cache
HIT, HIT
status
200
access-control-max-age
3000
x-cache-hits
1, 35
content-length
2726816
x-amz-id-2
mWHsl2sYOu/+PA50jplOKkh2z+yrEGfFs/ieLIo8lMTMeQeqIBU599XkeWU8xfJcP3mgsBHxOT4=
x-served-by
cache-iad2139-IAD, cache-hhn1520-HHN
access-control-allow-origin
*
last-modified
Mon, 19 Nov 2018 16:12:24 GMT
server
AmazonS3
x-timer
S1545313979.579668,VS0,VE0
etag
"e5cc5d73ecf849f04d70b28d6c01d7bf"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET, HEAD
x-amz-request-id
EEBFAD085ECB4F39
via
1.1 varnish 1.1 varnish
cache-control
max-age=600
accept-ranges
bytes
content-type
application/vnd.oasis.opendocument.formula-template
x-geoip-country-code
DE
motherboard-logo-black.svg
vice-web-statics-cdn.vice.com/logos/
6 KB
3 KB
Image
General
Full URL
https://vice-web-statics-cdn.vice.com/logos/motherboard-logo-black.svg
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.132 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f96618774a0bf374e4c203cc7fb4594235e4fd530b30dc7db0f8e411cdf5fdd5

Request headers

:path
/logos/motherboard-logo-black.svg
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
vice-web-statics-cdn.vice.com
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
:scheme
https
:method
GET
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:52:58 GMT
content-encoding
gzip
x-backend
23.235.46.49
age
248459
x-geoip-region-code
HE
x-cache
HIT, HIT
status
200
access-control-max-age
3000
x-cache-hits
1, 3
content-length
2316
x-amz-id-2
VyjftwGTa+9rjGeG/3uTwvAJ4x/1KlGZ5IMltpL5UyIiMEGOG/LMiuPv/ekDRrxDHhi+o++jg1Y=
x-served-by
cache-iad2149-IAD, cache-hhn1529-HHN
access-control-allow-origin
*
last-modified
Mon, 19 Nov 2018 16:12:31 GMT
server
AmazonS3
x-timer
S1545313979.802501,VS0,VE0
etag
"5d2a962da94b639253b4d6377dc6081b"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET, HEAD
x-amz-request-id
983FF833B39AD275
via
1.1 varnish 1.1 varnish
cache-control
max-age=600
accept-ranges
bytes
content-type
image/svg+xml
x-geoip-country-code
DE
1544733345519-shutterstock_788158579-copy.jpeg
video-images.vice.com/articles/5c12c1022f135f0006f9c3ee/lede/
238 KB
239 KB
Image
General
Full URL
https://video-images.vice.com/articles/5c12c1022f135f0006f9c3ee/lede/1544733345519-shutterstock_788158579-copy.jpeg?crop=1xw%3A0.8680555555555556xh%3Bcenter%2Ccenter&resize=2000%3A*
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.132 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx / VICE
Resource Hash
b02f19e267714a055b6ebd128e55d0233c1c882f5abc9027d51cdfa6b7e60859

Request headers

:path
/articles/5c12c1022f135f0006f9c3ee/lede/1544733345519-shutterstock_788158579-copy.jpeg?crop=1xw%3A0.8680555555555556xh%3Bcenter%2Ccenter&resize=2000%3A*
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
video-images.vice.com
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
:scheme
https
:method
GET
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:52:58 GMT
via
1.1 varnish 1.1 varnish
x-backend
23.235.46.43
age
85742
x-powered-by
VICE
x-cache
HIT, HIT
status
200
x-cache-hits
2, 3
content-length
244000
x-served-by
cache-iad2143-IAD, cache-hhn1529-HHN
pragma
public
accept-ranges
bytes
server
nginx
x-timer
S1545313979.836199,VS0,VE0
content-type
image/webp
expires
Thu, 27 Dec 2018 02:37:16 GMT
cache-control
max-age=650000, must-revalidate
x-geoip-region-code
HE
x-geoip-country-code
DE
truncated
/
752 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c0c0428d87cb56fe4e5dec0cf79e30c5cafc4e5ab9bd1a3abaedcb83083439b6

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
amp-ad-network-doubleclick-impl-0.1.js
cdn.ampproject.org/rtv/011812131718380/v0/
100 KB
34 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011812131718380/v0/amp-ad-network-doubleclick-impl-0.1.js
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cc32af945faafb600a6589257e2c7b5e85695cbc95c7a5aa8f8059807558adaf
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
gzip
x-content-type-options
nosniff
age
108472
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
35102
x-xss-protection
1; mode=block
server
sffe
date
Wed, 19 Dec 2018 07:45:06 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"3fc03d6a5a6ba1ed"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 19 Dec 2019 07:45:06 GMT
amp-ad-verifying-keyset.json
cdn.ampproject.org/
419 B
702 B
Fetch
General
Full URL
https://cdn.ampproject.org/amp-ad-verifying-keyset.json
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
622221d4b92040a92cac29d6aaa27b1602fd92b28997885b56cad5e529e07731
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:25:33 GMT
x-content-type-options
nosniff
last-modified
Fri, 19 May 2017 15:06:13 GMT
server
sffe
age
1645
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/jwk-set+json
access-control-allow-origin
*
cache-control
public, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
419
x-xss-protection
1; mode=block
expires
Thu, 20 Dec 2018 14:15:33 GMT
integrator.json
adservice.google.com/adsid/
88 B
231 B
Fetch
General
Full URL
https://adservice.google.com/adsid/integrator.json?domain=motherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
05a714591a87a3666b44e1872d464da51680f8807c6b6196dd837d9a120e2a88
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 20 Dec 2018 13:52:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
access-control-allow-origin
https://motherboard.vice.com
cache-control
private, no-cache, no-store
access-control-allow-credentials
true
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
87
x-xss-protection
1; mode=block
faf02c4a-1799-4d79-a1ff-c13b51ae2d53
cdn.krxd.net/userdata/v2/amp/
16 B
814 B
Fetch
General
Full URL
https://cdn.krxd.net/userdata/v2/amp/faf02c4a-1799-4d79-a1ff-c13b51ae2d53?segments_key=ksg&kuid_key=kuid&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
d399f9c8c92526fb78b76514e4071a337e24370882e9a3dbf1b649f5cc289716

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_userdata_krxd_net___UserData_Service_V2
Date
Thu, 20 Dec 2018 13:52:59 GMT
Content-Encoding
gzip
Age
0
X-Cache
MISS, HIT
X-Request-Backend
kuser_data
Connection
keep-alive
X-Age
0
Content-Length
36
X-Served-By
userdata-a005.krxd.net, cache-hhn1532-HHN
Access-Control-Allow-Origin
https://motherboard.vice.com
AMP-Access-Control-Allow-Source-Origin
https://motherboard.vice.com
X-Timer
S1545313979.015165,VS0,VE130
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 varnish
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
Cache-Control
private, max-age=3600
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
X-Cache-Hits
0, 1
faf02c4a-1799-4d79-a1ff-c13b51ae2d53
cdn.krxd.net/userdata/v2/amp/
16 B
815 B
Fetch
General
Full URL
https://cdn.krxd.net/userdata/v2/amp/faf02c4a-1799-4d79-a1ff-c13b51ae2d53?segments_key=ksg&kuid_key=kuid&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
d399f9c8c92526fb78b76514e4071a337e24370882e9a3dbf1b649f5cc289716

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_userdata_krxd_net___UserData_Service_V2
Date
Thu, 20 Dec 2018 13:52:59 GMT
Content-Encoding
gzip
Age
0
X-Cache
MISS, MISS
X-Request-Backend
kuser_data
Connection
keep-alive
X-Age
0
Content-Length
36
X-Served-By
userdata-a005.krxd.net, cache-hhn1523-HHN
Access-Control-Allow-Origin
https://motherboard.vice.com
AMP-Access-Control-Allow-Source-Origin
https://motherboard.vice.com
X-Timer
S1545313979.011670,VS0,VE131
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 varnish
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
Cache-Control
private, max-age=3600
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
X-Cache-Hits
0, 0
faf02c4a-1799-4d79-a1ff-c13b51ae2d53
cdn.krxd.net/userdata/v2/amp/
16 B
814 B
Fetch
General
Full URL
https://cdn.krxd.net/userdata/v2/amp/faf02c4a-1799-4d79-a1ff-c13b51ae2d53?segments_key=ksg&kuid_key=kuid&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
d399f9c8c92526fb78b76514e4071a337e24370882e9a3dbf1b649f5cc289716

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_userdata_krxd_net___UserData_Service_V2
Date
Thu, 20 Dec 2018 13:52:59 GMT
Content-Encoding
gzip
Age
0
X-Cache
MISS, HIT
X-Request-Backend
kuser_data
Connection
keep-alive
X-Age
0
Content-Length
36
X-Served-By
userdata-a005.krxd.net, cache-hhn1535-HHN
Access-Control-Allow-Origin
https://motherboard.vice.com
AMP-Access-Control-Allow-Source-Origin
https://motherboard.vice.com
X-Timer
S1545313979.011722,VS0,VE138
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 varnish
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
Cache-Control
private, max-age=3600
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
X-Cache-Hits
0, 1
faf02c4a-1799-4d79-a1ff-c13b51ae2d53
cdn.krxd.net/userdata/v2/amp/
16 B
814 B
Fetch
General
Full URL
https://cdn.krxd.net/userdata/v2/amp/faf02c4a-1799-4d79-a1ff-c13b51ae2d53?segments_key=ksg&kuid_key=kuid&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
d399f9c8c92526fb78b76514e4071a337e24370882e9a3dbf1b649f5cc289716

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_userdata_krxd_net___UserData_Service_V2
Date
Thu, 20 Dec 2018 13:52:59 GMT
Content-Encoding
gzip
Age
0
X-Cache
MISS, HIT
X-Request-Backend
kuser_data
Connection
keep-alive
X-Age
0
Content-Length
36
X-Served-By
userdata-a005.krxd.net, cache-hhn1543-HHN
Access-Control-Allow-Origin
https://motherboard.vice.com
AMP-Access-Control-Allow-Source-Origin
https://motherboard.vice.com
X-Timer
S1545313979.012716,VS0,VE129
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 varnish
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
Cache-Control
private, max-age=3600
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
X-Cache-Hits
0, 1
faf02c4a-1799-4d79-a1ff-c13b51ae2d53
cdn.krxd.net/userdata/v2/amp/
16 B
814 B
Fetch
General
Full URL
https://cdn.krxd.net/userdata/v2/amp/faf02c4a-1799-4d79-a1ff-c13b51ae2d53?segments_key=ksg&kuid_key=kuid&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
d399f9c8c92526fb78b76514e4071a337e24370882e9a3dbf1b649f5cc289716

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_userdata_krxd_net___UserData_Service_V2
Date
Thu, 20 Dec 2018 13:52:59 GMT
Content-Encoding
gzip
Age
0
X-Cache
MISS, HIT
X-Request-Backend
kuser_data
Connection
keep-alive
X-Age
0
Content-Length
36
X-Served-By
userdata-a005.krxd.net, cache-hhn1551-HHN
Access-Control-Allow-Origin
https://motherboard.vice.com
AMP-Access-Control-Allow-Source-Origin
https://motherboard.vice.com
X-Timer
S1545313979.011532,VS0,VE131
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 varnish
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
Cache-Control
private, max-age=3600
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
X-Cache-Hits
0, 1
faf02c4a-1799-4d79-a1ff-c13b51ae2d53
cdn.krxd.net/userdata/v2/amp/
16 B
814 B
Fetch
General
Full URL
https://cdn.krxd.net/userdata/v2/amp/faf02c4a-1799-4d79-a1ff-c13b51ae2d53?segments_key=ksg&kuid_key=kuid&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
d399f9c8c92526fb78b76514e4071a337e24370882e9a3dbf1b649f5cc289716

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_userdata_krxd_net___UserData_Service_V2
Date
Thu, 20 Dec 2018 13:52:59 GMT
Content-Encoding
gzip
Age
0
X-Cache
MISS, HIT
X-Request-Backend
kuser_data
Connection
keep-alive
X-Age
0
Content-Length
36
X-Served-By
userdata-a005.krxd.net, cache-hhn1540-HHN
Access-Control-Allow-Origin
https://motherboard.vice.com
AMP-Access-Control-Allow-Source-Origin
https://motherboard.vice.com
X-Timer
S1545313979.021923,VS0,VE123
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 varnish
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
Cache-Control
private, max-age=3600
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
X-Cache-Hits
0, 1
amp.json
www.googletagmanager.com/
16 KB
2 KB
Fetch
General
Full URL
https://www.googletagmanager.com/amp.json?id=GTM-P9JRJM9&gtm.url=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:815::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
4549c5b14c12cdadd29bcfcfacbbefd2f8253af85380d65d9d81cbb8b555a116
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:52:59 GMT
content-encoding
gzip
status
200
content-disposition
attachment; filename="GTM-P9JRJM9.json"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
1876
x-xss-protection
1; mode=block
pragma
no-cache
amp-access-control-allow-source-origin
https://motherboard.vice.com
server
Google Tag Manager (scaffolding)
vary
*
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
AMP-Access-Control-Allow-Source-Origin
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
expires
Fri, 01 Jan 1990 00:00:00 GMT
JLnYmGrt.json
cdn.krxd.net/controltag/amp/
456 B
1 KB
Fetch
General
Full URL
https://cdn.krxd.net/controltag/amp/JLnYmGrt.json?__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.175 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
dacf06788ae5b339352415b00dce4988404d6842fe3a38ec38b66ba7ef86b491

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-CDN-Backend
4FrRTvEr9h480D4BywjehZ--F_Config_Service_V3
Date
Thu, 20 Dec 2018 13:52:59 GMT
Content-Encoding
gzip
Age
865
Accept-Ranges
bytes
X-Cache
MISS, HIT, HIT
X-Request-Backend
krux_scala_config_webservice
Connection
keep-alive
Content-Length
285
X-Served-By
config-service-a001.krxd.net, cache-iad2142-IAD, cache-hhn1537-HHN
X-Response-Time
15
Access-Control-Allow-Origin
https://motherboard.vice.com
X-Do-Esi
esi
AMP-Access-Control-Allow-Source-Origin
https://motherboard.vice.com
X-Timer
S1545313979.083657,VS0,VE1
Vary
Origin,Accept-Encoding
Content-Type
application/json; charset=utf-8
Via
1.1 varnish, 1.1 varnish
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
Cache-Control
public, max-age=1200
X-Age
0
X-Cache-Hits
0, 1, 1
brandlift.php
www.facebook.com/
Redirect Chain
  • https://uaid-linkage.imrworldwide.com/cgi-bin/gn?prd=session&c13=asid,PC3E11FB8-EF45-4D94-A393-1BE694E98B4F&sessionId=amp-3x8dEKUZxxqBUH9MpXjgMA_9172&pingtype=4&enc=false&c61=createtm,1545313979029...
  • https://www.facebook.com/brandlift.php?sessionId=amp-3x8dEKUZxxqBUH9MpXjgMA_9172&advertiser_id=amp-3x8dEKUZxxqBUH9MpXjgMA_9172
67 B
205 B
Image
General
Full URL
https://www.facebook.com/brandlift.php?sessionId=amp-3x8dEKUZxxqBUH9MpXjgMA_9172&advertiser_id=amp-3x8dEKUZxxqBUH9MpXjgMA_9172
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
aa7b6c81e85551eeb5c4809f1e683efa0b780c33d12ddfc2067a1b136803e45a
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
x-fb-debug
8xlvRYZW6sUuUJcGtromSp51Uv7AbfeYozB9vDTkBJcFyJzXwyGAvcXcptVBJqfaRb2PCR2D45UzV4kWJrJejg==
content-encoding
br
x-content-type-options
nosniff
date
Thu, 20 Dec 2018 13:52:59 GMT
expect-ct
max-age=86400, report-uri="http://reports.fb.com/expectct/"
strict-transport-security
max-age=15552000; preload
content-type
image/png
status
200
cache-control
private, no-store, no-cache, must-revalidate
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT

Redirect headers

Location
https://www.facebook.com/brandlift.php?sessionId=amp-3x8dEKUZxxqBUH9MpXjgMA_9172&advertiser_id=amp-3x8dEKUZxxqBUH9MpXjgMA_9172
Date
Thu, 20 Dec 2018 13:52:59 GMT
Connection
keep-alive
X-Powered-By
Express
Content-Length
148
Vary
Accept
Content-Type
text/plain; charset=utf-8
a
cloudapi.imrworldwide.com/nmapi/v2/C3E11FB8-EF45-4D94-A393-1BE694E98B4F/amp-3x8dEKUZxxqBUH9MpXjgMA_9172/
35 B
333 B
Image
General
Full URL
https://cloudapi.imrworldwide.com/nmapi/v2/C3E11FB8-EF45-4D94-A393-1BE694E98B4F/amp-3x8dEKUZxxqBUH9MpXjgMA_9172/a?b=%7B%22devInfo%22%3A%7B%22devId%22%3A%22amp-3x8dEKUZxxqBUH9MpXjgMA_9172%22%2C%22apn%22%3A%22Motherboard%22%2C%22apv%22%3A%221.0%22%2C%22apid%22%3A%22C3E11FB8-EF45-4D94-A393-1BE694E98B4F%22%7D%2C%22metadata%22%3A%7B%22static%22%3A%7B%22type%22%3A%22static%22%2C%22section%22%3A%22phishing%22%2C%22assetid%22%3A%229172%22%2C%22segA%22%3A%22%22%2C%22segB%22%3A%22%22%2C%22segC%22%3A%22Google%20AMP%22%2C%22adModel%22%3A%220%22%2C%22dataSrc%22%3A%22cms%22%7D%2C%22content%22%3A%7B%7D%2C%22ad%22%3A%7B%7D%7D%2C%22event%22%3A%22playhead%22%2C%22position%22%3A%221545313979029%22%2C%22data%22%3A%7B%22hidden%22%3A%220%22%2C%22blur%22%3A%220%22%2C%22position%22%3A%221545313979030%22%7D%2C%22type%22%3A%22static%22%2C%22utc%22%3A%221545313979030%22%2C%22index%22%3A%222%22%7D
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.125 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-125.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:53:00 GMT
via
1.1 bee9d99ac2913ec4167e166e6bdb691e.cloudfront.net (CloudFront)
last-modified
Wed, 28 Feb 2018 19:19:07 GMT
server
AmazonS3
etag
"c2196de8ba412c60c22ab491af7b1409"
x-cache
Error from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
35
x-amz-cf-id
t5Yo8yD4l3VzwiCodua66Zg0WHQGWue8aHyX4NvP146xQH9MuEf8jA==
pixel;r=0.7848884212219693;a=p-6EzWtvBV9sFU3;labels=AMP;fpan=;fpa=amp-ZKlUB5vXXtzXB5jsMD1qOA;ns=0;ce=1;cm=;je=0;sr=1600x1200x24;enc=n;et=1545313979038;ref=;url=https%3A%2F%2Fmotherboard.vice.com%2F...
pixel.quantserve.com/
43 B
487 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=0.7848884212219693;a=p-6EzWtvBV9sFU3;labels=AMP;fpan=;fpa=amp-ZKlUB5vXXtzXB5jsMD1qOA;ns=0;ce=1;cm=;je=0;sr=1600x1200x24;enc=n;et=1545313979038;ref=;url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.177.117.159 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-177-117-159.eu-west-2.compute.amazonaws.com
Software
QS /
Resource Hash
013042932688da7c3b9af64ecfffb3c3e8ef3aaa0881d57c192df167f1b2a9b9

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 20 Dec 2018 13:53:00 GMT
Server
QS
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 04 Aug 1978 12:00:00 GMT
atrk.gif
certify-amp.alexametrics.com/
43 B
528 B
Image
General
Full URL
https://certify-amp.alexametrics.com/atrk.gif?account=x5HVh1aUXR00Gi&domain=vice.com&jsv=amp-1812131718380&frame_height=1200&frame_width=1600&title=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&time=1545313979043&time_zone_offset=0&screen_params=1600x1200x24&ref_url=&host_url=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&random_number=0.7452864259104384&user_cookie=amp-gxs3bDTwYMVx3L1rQzr5XQ&user_cookie_flag=0&user_lang=en-us&amp_doc_url=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.26 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-26.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 20 Dec 2018 04:05:12 GMT
Via
1.1 b83a899c16a2f53127e152fe5fc783a4.cloudfront.net (CloudFront)
x-amz-meta-alexa-last-modified
20110117123941
Last-Modified
Mon, 05 Dec 2016 19:51:57 GMT
Server
AmazonS3
Age
45253
ETag
"221d8352905f2c38b3cb2bd191d630b0"
X-Cache
Hit from cloudfront
Content-Type
image/gif
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
X-Amz-Cf-Id
sCDi5_zs6ViwF9C4nlWS09hSxDs0MLQwTxKPQYaPRuMnQGvIxiEr2A==
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=8568956&cs_pv=9172&c12=amp-84E4Z8KiMrDimZ4qt35YqQ&rn=0.02077417981520613&c8=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&c7=https%3...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=8568956&cs_pv=9172&c12=amp-84E4Z8KiMrDimZ4qt35YqQ&rn=0.02077417981520613&c8=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&c7=https%...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=8568956&cs_pv=9172&c12=amp-84E4Z8KiMrDimZ4qt35YqQ&rn=0.02077417981520613&c8=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&c7=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&c9=&cs_c7amp=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&comscorekw=amp
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 20 Dec 2018 13:52:59 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=8568956&cs_pv=9172&c12=amp-84E4Z8KiMrDimZ4qt35YqQ&rn=0.02077417981520613&c8=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&c7=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&c9=&cs_c7amp=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&comscorekw=amp
Pragma
no-cache
Date
Thu, 20 Dec 2018 13:52:59 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
tr
www.facebook.com/
44 B
249 B
Image
General
Full URL
https://www.facebook.com/tr?id=782589578427709&ev=ViewContent&cd%5Bcontributors%5D=joseph-cox%7Cjason-koebler&cd%5Barticle_id%5D=5c12c1022f135f0006f9c3ee&cd%5Bshare_description%5D=null&cd%5Bshare_title%5D=null&cd%5Blocale%5D=en_us&cd%5Bnsfw%5D=false&cd%5Bdisplay_type%5D=short-form&cd%5Bkeywords%5D=2fa%7Ccybersecurity%7Cemail%7Cemail-hack%7Cgmail%7Cgovernment-hackers%7Cphishing%7Cspear-phishing%7Ctwo-factor-authentication%7Cyahoo&cd%5Barticle_webId%5D=bje3kw&cd%5Bword_count%5D=1158&gtmcb=1655081584
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:52:59 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Thu, 20 Dec 2018 13:52:59 GMT
800000000001
prof.estat.com/m/web/
43 B
388 B
Image
General
Full URL
https://prof.estat.com/m/web/800000000001?c=&dom=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&enc=UTF-8&l3=&l4=&n=0.5698845584298207&p=&r=&sch=1200&scw=1600&tn=amp&v=1&vh=1200&vw=1600
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.47.40.236 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-47-40-236.eu-west-3.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
2dfe28cbdb83f01c940de6a88ab86200154fd772d568035ac568664e52068363

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:53:03 GMT
last-modified
Tue, 15 Dec 2009 10:03:23 GMT
server
nginx/1.12.1
etag
"57b5e6-2b-47ac1801550c0"-gzip
p3p
policyref="/w3c/p3p.xml",CP="NOI DSP COR CURa DEVa PSAa STP UNI COM OUR NAV INT"
status
200
cache-control
max-age=1
content-type
image/gif
content-length
43
expires
Thu, 20 Dec 2018 13:53:04 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
439 B
Fetch
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=utf-8

Response headers

date
Thu, 20 Dec 2018 13:52:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
1; mode=block
publisher:getClientId
ampcid.google.de/v1/
3 B
368 B
Fetch
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=utf-8

Response headers

date
Thu, 20 Dec 2018 13:52:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
1; mode=block
ads
securepubads.g.doubleclick.net/gampad/
21 KB
10 KB
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?iu=%2F16916245%2Foo_amp%2Fmotherboard&adk=1168693544&sz=300x250&output=html&impl=ifr&ifi=1&scp=aid%3Dhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo%26brand_name%3Dmotherboard%26country%3Den_us%26gs_cat%3Dcg_google_au%2Cgv_safe_core%2Cmiddle_east_safe%2Ccg_uksafe%2Cgs_tech%2Cnab_bank_exclude%2Cneg_us_battlefield%2Cneg_toyota%2Cgs_tech_computing%2Cgs_interest_male%2Cbundle_safety%2Cgv_crime%2Cneg_diageo_october_2018_brandsafety%2Cgs_interest_online_shoppers%2Cgs_tech_phones%2Ccrime_low_all_lang%2Cgs_interest_frequent_travelers%2Cneg_cg_us_lexus%2Cgs_politics%26keywords%3Dphishing%2Ccybersecurity%2CYahoo!%2Cemail%2CGmail%2Cemail%2520hack%2Ctwo-factor%2520authentication%2Cspear%2520phishing%2C2fa%2CGovernment%2520Hackers%26pagetype%3Dshortform%26pos%3Dt%26topic%3Dphishing%26counter%3D1%26utm_source%3D&adf=3100973819&nhd=0&eid=21060933&adx=643&ady=1230&oid=2&adsid=NT&gdfp_req=1&sfv=1-0-23&u_sd=1&artc=390&ati=2&ard=cdn.krxd.net%2Fuserdata%2Fv2%2Famp%2Ffaf02c4a-1799-4d79-a1&is_amp=3&amp_v=1812131718380&d_imp=1&c=1583009172&ga_cid=amp-pMmJfo1Ymi58x3ighbQ-IA&ga_hid=9172&dt=1545313978941&biw=1600&bih=1200&u_aw=1600&u_ah=1200&u_cd=24&u_w=1600&u_h=1200&u_tz=0&u_his=2&vis=1&scr_x=0&scr_y=0&bc=7&url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&loc=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&bdt=557&dtd=647&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.18.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
233b6d7f73a238f3baaec880270a4d8d4ddc9c5597f440d3e2b134d2ebf5e4c2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:52:59 GMT
content-encoding
br
x-content-type-options
nosniff
x-ampsafeframeversion
1-0-31
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
x-ampadrender
safeframe
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
9082
x-xss-protection
1; mode=block
google-lineitem-id
4745729218
x-ampanalytics
{"url":["https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstkN4x4V3GM12Wd8PcqZCjwzSWT7EJzqTB1_7nFP2R-Z8SYZTjc-vcOuUxM3aI9z_u2Uh2-mXh4YhX9lTqKCJ4SZ1gvghOQPAit0yI\u0026sig=Cg0ArKJSzI47mCxyVMrMEAE\u0026id=ampim\u0026o=${elementX},${elementY}\u0026d=${elementWidth},${elementHeight}\u0026ss=${screenWidth},${screenHeight}\u0026bs=${viewportWidth},${viewportHeight}\u0026mcvt=${maxContinuousVisibleTime}\u0026mtos=0,0,${maxContinuousVisibleTime},${maxContinuousVisibleTime},${maxContinuousVisibleTime}\u0026tos=0,0,${totalVisibleTime},0,0\u0026tfs=${firstSeenTime}\u0026tls=${lastSeenTime}\u0026g=${minVisiblePercentage}\u0026h=${maxVisiblePercentage}\u0026pt=${pageLoadTime}\u0026tt=${totalTime}\u0026rpt=${pageLoadTime}\u0026rst=${navTiming(navigationStart)}\u0026r=v\u0026adk=1168693544\u0026avms=ampa"]}
x-qqid
CLGOyZbHrt8CFRi8dwod6SAGmw
amp-access-control-allow-source-origin
https://motherboard.vice.com
server
cafe
google-mediationtag-id
-2
google-creative-id
138243962526
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
Google-Creative-Id,Google-LineItem-Id,AMP-Access-Control-Allow-Source-Origin,X-AmpAnalytics,X-QQID,amp-ff-sandbox,X-AmpSafeFrameVersion,X-AmpAdRender
cache-control
private
access-control-allow-credentials
true
timing-allow-origin
*
amp-ff-sandbox
true
expires
Thu, 20 Dec 2018 13:52:59 GMT
ads
securepubads.g.doubleclick.net/gampad/
43 KB
17 KB
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?iu=%2F16916245%2Foo_amp%2Fmotherboard&adk=1325938609&sz=320x50&output=html&impl=ifr&ifi=2&scp=aid%3Dhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo%26brand_name%3Dmotherboard%26country%3Den_us%26gs_cat%3Dcg_google_au%2Cgv_safe_core%2Cmiddle_east_safe%2Ccg_uksafe%2Cgs_tech%2Cnab_bank_exclude%2Cneg_us_battlefield%2Cneg_toyota%2Cgs_tech_computing%2Cgs_interest_male%2Cbundle_safety%2Cgv_crime%2Cneg_diageo_october_2018_brandsafety%2Cgs_interest_online_shoppers%2Cgs_tech_phones%2Ccrime_low_all_lang%2Cgs_interest_frequent_travelers%2Cneg_cg_us_lexus%2Cgs_politics%26keywords%3Dphishing%2Ccybersecurity%2CYahoo!%2Cemail%2CGmail%2Cemail%2520hack%2Ctwo-factor%2520authentication%2Cspear%2520phishing%2C2fa%2CGovernment%2520Hackers%26pagetype%3Dshortform%26pos%3Dfirst%26topic%3Dphishing%26counter%3D%26utm_source%3D&adf=3865363602&nhd=0&eid=21060933&adx=633&ady=158&oid=2&adsid=NT&gdfp_req=1&sfv=1-0-23&u_sd=1&artc=393&ati=2&ard=cdn.krxd.net%2Fuserdata%2Fv2%2Famp%2Ffaf02c4a-1799-4d79-a1&is_amp=3&amp_v=1812131718380&d_imp=1&c=1583009172&ga_cid=amp-pMmJfo1Ymi58x3ighbQ-IA&ga_hid=9172&dt=1545313978940&biw=1600&bih=1200&u_aw=1600&u_ah=1200&u_cd=24&u_w=1600&u_h=1200&u_tz=0&u_his=2&vis=1&scr_x=0&scr_y=0&bc=7&url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&loc=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&bdt=556&dtd=648&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.18.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
70bf128102a02f1932763f5aab78c7ad2b62391c3234a4b38e8fb11ad06efa39
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:52:59 GMT
content-encoding
br
x-content-type-options
nosniff
x-ampsafeframeversion
1-0-31
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
x-ampadrender
safeframe
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
16054
x-xss-protection
1; mode=block
google-lineitem-id
4894637517
x-ampanalytics
{"url":["https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssqWaVugweG8tnlkDiEMsPKZgpwhN5EwEhwTLjXT4cjPOdfb5JeqNZLFhrTninPLa59a5Br-q0uP9zFBIRpyXeNVbgAE2_Y0iwyTyI\u0026sig=Cg0ArKJSzDbaI51oOwpaEAE\u0026id=ampim\u0026o=${elementX},${elementY}\u0026d=${elementWidth},${elementHeight}\u0026ss=${screenWidth},${screenHeight}\u0026bs=${viewportWidth},${viewportHeight}\u0026mcvt=${maxContinuousVisibleTime}\u0026mtos=0,0,${maxContinuousVisibleTime},${maxContinuousVisibleTime},${maxContinuousVisibleTime}\u0026tos=0,0,${totalVisibleTime},0,0\u0026tfs=${firstSeenTime}\u0026tls=${lastSeenTime}\u0026g=${minVisiblePercentage}\u0026h=${maxVisiblePercentage}\u0026pt=${pageLoadTime}\u0026tt=${totalTime}\u0026rpt=${pageLoadTime}\u0026rst=${navTiming(navigationStart)}\u0026r=v\u0026adk=1325938609\u0026avms=ampa"]}
x-qqid
CJ2nyZbHrt8CFc-HdwodML0NrA
amp-access-control-allow-source-origin
https://motherboard.vice.com
server
cafe
google-mediationtag-id
-2
google-creative-id
138254934463
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
Google-Creative-Id,Google-LineItem-Id,AMP-Access-Control-Allow-Source-Origin,X-AmpAnalytics,X-QQID,amp-ff-sandbox,X-AmpSafeFrameVersion,X-AmpAdRender
cache-control
private
access-control-allow-credentials
true
timing-allow-origin
*
amp-ff-sandbox
true
expires
Thu, 20 Dec 2018 13:52:59 GMT
ads
securepubads.g.doubleclick.net/gampad/
22 KB
11 KB
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?iu=%2F16916245%2Foo_amp%2Fmotherboard&adk=192648298&sz=300x250&output=html&impl=ifr&ifi=3&scp=aid%3Dhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo%26brand_name%3Dmotherboard%26country%3Den_us%26gs_cat%3Dcg_google_au%2Cgv_safe_core%2Cmiddle_east_safe%2Ccg_uksafe%2Cgs_tech%2Cnab_bank_exclude%2Cneg_us_battlefield%2Cneg_toyota%2Cgs_tech_computing%2Cgs_interest_male%2Cbundle_safety%2Cgv_crime%2Cneg_diageo_october_2018_brandsafety%2Cgs_interest_online_shoppers%2Cgs_tech_phones%2Ccrime_low_all_lang%2Cgs_interest_frequent_travelers%2Cneg_cg_us_lexus%2Cgs_politics%26keywords%3Dphishing%2Ccybersecurity%2CYahoo!%2Cemail%2CGmail%2Cemail%2520hack%2Ctwo-factor%2520authentication%2Cspear%2520phishing%2C2fa%2CGovernment%2520Hackers%26pagetype%3Dshortform%26pos%3Dscroll%26topic%3Dphishing%26counter%3D3%26utm_source%3D&adf=2933169337&nhd=0&eid=21060933&adx=643&ady=3262&oid=2&adsid=NT&gdfp_req=1&sfv=1-0-23&u_sd=1&artc=394&ati=2&ard=cdn.krxd.net%2Fuserdata%2Fv2%2Famp%2Ffaf02c4a-1799-4d79-a1&is_amp=3&amp_v=1812131718380&d_imp=1&c=1583009172&ga_cid=amp-pMmJfo1Ymi58x3ighbQ-IA&ga_hid=9172&dt=1545313978941&biw=1600&bih=1200&u_aw=1600&u_ah=1200&u_cd=24&u_w=1600&u_h=1200&u_tz=0&u_his=2&vis=1&scr_x=0&scr_y=0&bc=7&url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&loc=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&bdt=557&dtd=647&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.18.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
9da7f5c190cb6727e1009855e410d40864969e65ee5a68537ef96d6125c13eaf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:53:00 GMT
content-encoding
br
x-content-type-options
nosniff
x-ampsafeframeversion
1-0-31
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
x-ampadrender
safeframe
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
9877
x-xss-protection
1; mode=block
google-lineitem-id
4870089095
x-ampanalytics
{"url":["https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsu_h0BzFcF1qbYnr6ThOKhDgQTENltfqjVjifC9tQ1G58Hx-4gvU_bLtOnxEt9nm4f5xbiirYn32_GEONfvDZBneU1LT0yq-hBtJrI\u0026sig=Cg0ArKJSzHDlgyl_4DwAEAE\u0026id=ampim\u0026o=${elementX},${elementY}\u0026d=${elementWidth},${elementHeight}\u0026ss=${screenWidth},${screenHeight}\u0026bs=${viewportWidth},${viewportHeight}\u0026mcvt=${maxContinuousVisibleTime}\u0026mtos=0,0,${maxContinuousVisibleTime},${maxContinuousVisibleTime},${maxContinuousVisibleTime}\u0026tos=0,0,${totalVisibleTime},0,0\u0026tfs=${firstSeenTime}\u0026tls=${lastSeenTime}\u0026g=${minVisiblePercentage}\u0026h=${maxVisiblePercentage}\u0026pt=${pageLoadTime}\u0026tt=${totalTime}\u0026rpt=${pageLoadTime}\u0026rst=${navTiming(navigationStart)}\u0026r=v\u0026adk=192648298\u0026avms=ampa"]}
x-qqid
CI69yZbHrt8CFZaadwod3l4CvQ
amp-access-control-allow-source-origin
https://motherboard.vice.com
server
cafe
google-mediationtag-id
-2
google-creative-id
138253845872
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
Google-Creative-Id,Google-LineItem-Id,AMP-Access-Control-Allow-Source-Origin,X-AmpAnalytics,X-QQID,amp-ff-sandbox,X-AmpSafeFrameVersion,X-AmpAdRender
cache-control
private
access-control-allow-credentials
true
timing-allow-origin
*
amp-ff-sandbox
true
expires
Thu, 20 Dec 2018 13:53:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
21 KB
10 KB
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?iu=%2F16916245%2Foo_amp%2Fmotherboard&adk=4102796204&sz=300x250&output=html&impl=ifr&ifi=4&scp=aid%3Dhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo%26brand_name%3Dmotherboard%26country%3Den_us%26gs_cat%3Dcg_google_au%2Cgv_safe_core%2Cmiddle_east_safe%2Ccg_uksafe%2Cgs_tech%2Cnab_bank_exclude%2Cneg_us_battlefield%2Cneg_toyota%2Cgs_tech_computing%2Cgs_interest_male%2Cbundle_safety%2Cgv_crime%2Cneg_diageo_october_2018_brandsafety%2Cgs_interest_online_shoppers%2Cgs_tech_phones%2Ccrime_low_all_lang%2Cgs_interest_frequent_travelers%2Cneg_cg_us_lexus%2Cgs_politics%26keywords%3Dphishing%2Ccybersecurity%2CYahoo!%2Cemail%2CGmail%2Cemail%2520hack%2Ctwo-factor%2520authentication%2Cspear%2520phishing%2C2fa%2CGovernment%2520Hackers%26pagetype%3Dshortform%26pos%3Dscroll%26topic%3Dphishing%26counter%3D5%26utm_source%3D&adf=1740109183&nhd=0&eid=21060933&adx=643&ady=4932&oid=2&adsid=NT&gdfp_req=1&sfv=1-0-23&u_sd=1&artc=396&ati=2&ard=cdn.krxd.net%2Fuserdata%2Fv2%2Famp%2Ffaf02c4a-1799-4d79-a1&is_amp=3&amp_v=1812131718380&d_imp=1&c=1583009172&ga_cid=amp-pMmJfo1Ymi58x3ighbQ-IA&ga_hid=9172&dt=1545313978941&biw=1600&bih=1200&u_aw=1600&u_ah=1200&u_cd=24&u_w=1600&u_h=1200&u_tz=0&u_his=2&vis=1&scr_x=0&scr_y=0&bc=7&url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&loc=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&bdt=557&dtd=647&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.18.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
5ade5f1ab73672db46d8d1c9efffa747ddde0afb1fbf1dc4ac65dfaf08c47f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:53:00 GMT
content-encoding
br
x-content-type-options
nosniff
x-ampsafeframeversion
1-0-31
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
x-ampadrender
safeframe
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
9190
x-xss-protection
1; mode=block
google-lineitem-id
4887627083
x-ampanalytics
{"url":["https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvP-a_mQxH7SiyjhGYFj28OCY-INuBqh8ijmCNNY0fzJFPQeQAyxa-DgstNcQIKjxvJxd-Y2ojE1tThCmEtQiFu1LDoK6ftEKAujdc\u0026sig=Cg0ArKJSzIuqJ_YW7LtGEAE\u0026id=ampim\u0026o=${elementX},${elementY}\u0026d=${elementWidth},${elementHeight}\u0026ss=${screenWidth},${screenHeight}\u0026bs=${viewportWidth},${viewportHeight}\u0026mcvt=${maxContinuousVisibleTime}\u0026mtos=0,0,${maxContinuousVisibleTime},${maxContinuousVisibleTime},${maxContinuousVisibleTime}\u0026tos=0,0,${totalVisibleTime},0,0\u0026tfs=${firstSeenTime}\u0026tls=${lastSeenTime}\u0026g=${minVisiblePercentage}\u0026h=${maxVisiblePercentage}\u0026pt=${pageLoadTime}\u0026tt=${totalTime}\u0026rpt=${pageLoadTime}\u0026rst=${navTiming(navigationStart)}\u0026r=v\u0026adk=4102796204\u0026avms=ampa"]}
x-qqid
CMTHyZbHrt8CFcP1dwodcHUOyg
amp-access-control-allow-source-origin
https://motherboard.vice.com
server
cafe
google-mediationtag-id
-2
google-creative-id
138254870266
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
Google-Creative-Id,Google-LineItem-Id,AMP-Access-Control-Allow-Source-Origin,X-AmpAnalytics,X-QQID,amp-ff-sandbox,X-AmpSafeFrameVersion,X-AmpAdRender
cache-control
private
access-control-allow-credentials
true
timing-allow-origin
*
amp-ff-sandbox
true
expires
Thu, 20 Dec 2018 13:53:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
22 KB
10 KB
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?iu=%2F16916245%2Foo_amp%2Fmotherboard&adk=119573195&sz=300x250&output=html&impl=ifr&ifi=5&scp=aid%3Dhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo%26brand_name%3Dmotherboard%26country%3Den_us%26gs_cat%3Dcg_google_au%2Cgv_safe_core%2Cmiddle_east_safe%2Ccg_uksafe%2Cgs_tech%2Cnab_bank_exclude%2Cneg_us_battlefield%2Cneg_toyota%2Cgs_tech_computing%2Cgs_interest_male%2Cbundle_safety%2Cgv_crime%2Cneg_diageo_october_2018_brandsafety%2Cgs_interest_online_shoppers%2Cgs_tech_phones%2Ccrime_low_all_lang%2Cgs_interest_frequent_travelers%2Cneg_cg_us_lexus%2Cgs_politics%26keywords%3Dphishing%2Ccybersecurity%2CYahoo!%2Cemail%2CGmail%2Cemail%2520hack%2Ctwo-factor%2520authentication%2Cspear%2520phishing%2C2fa%2CGovernment%2520Hackers%26pagetype%3Dshortform%26pos%3Dscroll%26topic%3Dphishing%26counter%3D4%26utm_source%3D&adf=4214482392&nhd=0&eid=21060933&adx=643&ady=3982&oid=2&adsid=NT&gdfp_req=1&sfv=1-0-23&u_sd=1&artc=398&ati=2&ard=cdn.krxd.net%2Fuserdata%2Fv2%2Famp%2Ffaf02c4a-1799-4d79-a1&is_amp=3&amp_v=1812131718380&d_imp=1&c=1583009172&ga_cid=amp-pMmJfo1Ymi58x3ighbQ-IA&ga_hid=9172&dt=1545313978941&biw=1600&bih=1200&u_aw=1600&u_ah=1200&u_cd=24&u_w=1600&u_h=1200&u_tz=0&u_his=2&vis=1&scr_x=0&scr_y=0&bc=7&url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&loc=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&bdt=557&dtd=648&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.18.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
ad42ebb7fe1f6744dd1550cc0f170e459caf14d4bcac5b9948ef47ba0f521f83
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:53:00 GMT
content-encoding
br
x-content-type-options
nosniff
x-ampsafeframeversion
1-0-31
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
x-ampadrender
safeframe
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
9686
x-xss-protection
1; mode=block
google-lineitem-id
4881682765
x-ampanalytics
{"url":["https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsv3lqAkGQdo1W1v-niTTOmByeOIFIp_NfWlyaNmKI2Qmpmy2-ngdJV58tAP_CI3wmKH34cpYoOIeSIwwDdCRmTyxNVCpGPgZEfoCus\u0026sig=Cg0ArKJSzDovIsrC_wWsEAE\u0026id=ampim\u0026o=${elementX},${elementY}\u0026d=${elementWidth},${elementHeight}\u0026ss=${screenWidth},${screenHeight}\u0026bs=${viewportWidth},${viewportHeight}\u0026mcvt=${maxContinuousVisibleTime}\u0026mtos=0,0,${maxContinuousVisibleTime},${maxContinuousVisibleTime},${maxContinuousVisibleTime}\u0026tos=0,0,${totalVisibleTime},0,0\u0026tfs=${firstSeenTime}\u0026tls=${lastSeenTime}\u0026g=${minVisiblePercentage}\u0026h=${maxVisiblePercentage}\u0026pt=${pageLoadTime}\u0026tt=${totalTime}\u0026rpt=${pageLoadTime}\u0026rst=${navTiming(navigationStart)}\u0026r=v\u0026adk=119573195\u0026avms=ampa"]}
x-qqid
CO3DyZbHrt8CFRi8dwod6SAGmw
amp-access-control-allow-source-origin
https://motherboard.vice.com
server
cafe
google-mediationtag-id
-2
google-creative-id
138254992903
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
Google-Creative-Id,Google-LineItem-Id,AMP-Access-Control-Allow-Source-Origin,X-AmpAnalytics,X-QQID,amp-ff-sandbox,X-AmpSafeFrameVersion,X-AmpAdRender
cache-control
private
access-control-allow-credentials
true
timing-allow-origin
*
amp-ff-sandbox
true
expires
Thu, 20 Dec 2018 13:53:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
21 KB
10 KB
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?iu=%2F16916245%2Foo_amp%2Fmotherboard&adk=1095618441&sz=300x250&output=html&impl=ifr&ifi=6&scp=aid%3Dhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo%26brand_name%3Dmotherboard%26country%3Den_us%26gs_cat%3Dcg_google_au%2Cgv_safe_core%2Cmiddle_east_safe%2Ccg_uksafe%2Cgs_tech%2Cnab_bank_exclude%2Cneg_us_battlefield%2Cneg_toyota%2Cgs_tech_computing%2Cgs_interest_male%2Cbundle_safety%2Cgv_crime%2Cneg_diageo_october_2018_brandsafety%2Cgs_interest_online_shoppers%2Cgs_tech_phones%2Ccrime_low_all_lang%2Cgs_interest_frequent_travelers%2Cneg_cg_us_lexus%2Cgs_politics%26keywords%3Dphishing%2Ccybersecurity%2CYahoo!%2Cemail%2CGmail%2Cemail%2520hack%2Ctwo-factor%2520authentication%2Cspear%2520phishing%2C2fa%2CGovernment%2520Hackers%26pagetype%3Dshortform%26pos%3Dscroll%26topic%3Dphishing%26counter%3D2%26utm_source%3D&adf=1624942874&nhd=0&eid=21060933&adx=643&ady=2257&oid=2&adsid=NT&gdfp_req=1&sfv=1-0-23&u_sd=1&artc=399&ati=2&ard=cdn.krxd.net%2Fuserdata%2Fv2%2Famp%2Ffaf02c4a-1799-4d79-a1&is_amp=3&amp_v=1812131718380&d_imp=1&c=1583009172&ga_cid=amp-pMmJfo1Ymi58x3ighbQ-IA&ga_hid=9172&dt=1545313978941&biw=1600&bih=1200&u_aw=1600&u_ah=1200&u_cd=24&u_w=1600&u_h=1200&u_tz=0&u_his=2&vis=1&scr_x=0&scr_y=0&bc=7&url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&loc=https%3A%2F%2Fmotherboard.vice.com%2Famp%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&bdt=557&dtd=648&__amp_source_origin=https%3A%2F%2Fmotherboard.vice.com
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.18.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
zrh04s05-in-f98.1e100.net
Software
cafe /
Resource Hash
ffdd1a09a3cb6880ff4c564eec65dbb0c3d8de16bf922756b462beaf00f03394
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com

Response headers

date
Thu, 20 Dec 2018 13:53:00 GMT
content-encoding
br
x-content-type-options
nosniff
x-ampsafeframeversion
1-0-31
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
x-ampadrender
safeframe
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
9099
x-xss-protection
1; mode=block
google-lineitem-id
4889076905
x-ampanalytics
{"url":["https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjst_8IgZm2rA4P4tELks6f0TxcJOKqLQg84ycF4mgJJi-rGDvPX8v-DVn97xXjY-n8Wnk5Jgkxpp1mW3fnQOG0gUle1aIf_1oxJViY8\u0026sig=Cg0ArKJSzEceh1DXyyyEEAE\u0026id=ampim\u0026o=${elementX},${elementY}\u0026d=${elementWidth},${elementHeight}\u0026ss=${screenWidth},${screenHeight}\u0026bs=${viewportWidth},${viewportHeight}\u0026mcvt=${maxContinuousVisibleTime}\u0026mtos=0,0,${maxContinuousVisibleTime},${maxContinuousVisibleTime},${maxContinuousVisibleTime}\u0026tos=0,0,${totalVisibleTime},0,0\u0026tfs=${firstSeenTime}\u0026tls=${lastSeenTime}\u0026g=${minVisiblePercentage}\u0026h=${maxVisiblePercentage}\u0026pt=${pageLoadTime}\u0026tt=${totalTime}\u0026rpt=${pageLoadTime}\u0026rst=${navTiming(navigationStart)}\u0026r=v\u0026adk=1095618441\u0026avms=ampa"]}
x-qqid
COfayZbHrt8CFcP1dwodcHUOyg
amp-access-control-allow-source-origin
https://motherboard.vice.com
server
cafe
google-mediationtag-id
-2
google-creative-id
138254158001
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://motherboard.vice.com
access-control-expose-headers
Google-Creative-Id,Google-LineItem-Id,AMP-Access-Control-Allow-Source-Origin,X-AmpAnalytics,X-QQID,amp-ff-sandbox,X-AmpSafeFrameVersion,X-AmpAdRender
cache-control
private
access-control-allow-credentials
true
timing-allow-origin
*
amp-ff-sandbox
true
expires
Thu, 20 Dec 2018 13:53:00 GMT
page
api.segment.io/v1/pixel/
42 B
133 B
Image
General
Full URL
https://api.segment.io/v1/pixel/page?writeKey=DD3vdTGqyLGy73gp9KPLOe5xUUZcpwha&context.library.name=amp&anonymousId=amp-pMmJfo1Ymi58x3ighbQ-IA&context.locale=en-us&context.page.path=%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&context.page.url=https%3A%2F%2Fmotherboard.vice.com%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&context.page.referrer=&context.page.title=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&context.screen.width=1600&context.screen.height=1200&name=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale&properties.articleUID=5c12c1022f135f0006f9c3ee&properties.topics=2fa%7Ccybersecurity%7Cemail%7Cemail-hack%7Cgmail%7Cgovernment-hackers%7Cphishing%7Cspear-phishing%7Ctwo-factor-authentication%7Cyahoo&properties.NSFB=False&properties.templateType=amp-short-form&properties.authors=joseph-cox%7Cjason-koebler&properties.locale=en_us&properties.customSocialTitle=null&properties.customSocialDescription=null&properties.videoLedeSource=&properties.videoEmbedSource=&properties.webID=bje3kw&properties.wordCount=1158&properties.editor=jason-koebler&properties.socialImage=False&properties.pageType=article
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.191.154.91 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-191-154-91.us-west-2.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Thu, 20 Dec 2018 13:53:00 GMT
cache-control
no-cache, max-age=0
content-length
42
content-type
image/gif
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=a1&gtm=2agbc0GTM-P9JRJM9&ds=AMP&aip=true&_s=4&dt=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&sr=1600x1200&_utmht=1545313979...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-599058-191&cid=amp-pMmJfo1Ymi58x3ighbQ-IA&jid=0.30644462758560187&_v=a1&z=0.2541533254562651
35 B
113 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-599058-191&cid=amp-pMmJfo1Ymi58x3ighbQ-IA&jid=0.30644462758560187&_v=a1&z=0.2541533254562651
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:400c:c08::9b , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
date
Thu, 20 Dec 2018 13:52:59 GMT
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 20 Dec 2018 13:52:59 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-599058-191&cid=amp-pMmJfo1Ymi58x3ighbQ-IA&jid=0.30644462758560187&_v=a1&z=0.2541533254562651
content-type
text/html; charset=UTF-8
status
302
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
390
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-31/html/
0
2 KB
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://motherboard.vice.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

container.html
tpc.googlesyndication.com/safeframe/1-0-31/html/ Frame 6A42
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0/amp-ad-0.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-31/html/container.html?n=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
1737
date
Thu, 20 Dec 2018 10:04:46 GMT
expires
Fri, 20 Dec 2019 10:04:46 GMT
last-modified
Thu, 01 Nov 2018 14:23:58 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, immutable, max-age=31536000
age
13693
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
container.html
tpc.googlesyndication.com/safeframe/1-0-31/html/ Frame 5B37
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0/amp-ad-0.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-31/html/container.html?n=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
1737
date
Thu, 20 Dec 2018 10:04:46 GMT
expires
Fri, 20 Dec 2019 10:04:46 GMT
last-modified
Thu, 01 Nov 2018 14:23:58 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, immutable, max-age=31536000
age
13693
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
r
amp-error-reporting.appspot.com/
2 B
64 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81b::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 20 Dec 2018 13:53:00 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
2
container.html
tpc.googlesyndication.com/safeframe/1-0-31/html/ Frame A42E
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0/amp-ad-0.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-31/html/container.html?n=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
1737
date
Thu, 20 Dec 2018 10:04:46 GMT
expires
Fri, 20 Dec 2019 10:04:46 GMT
last-modified
Thu, 01 Nov 2018 14:23:58 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, immutable, max-age=31536000
age
13694
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
r
amp-error-reporting.appspot.com/
2 B
64 B
XHR
General
Full URL
https://amp-error-reporting.appspot.com/r
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81b::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/ Express
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Origin
https://motherboard.vice.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 20 Dec 2018 13:53:00 GMT
via
1.1 google
x-powered-by
Express
status
200
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
2
container.html
tpc.googlesyndication.com/safeframe/1-0-31/html/ Frame 33A9
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0/amp-ad-0.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-31/html/container.html?n=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
1737
date
Thu, 20 Dec 2018 10:04:46 GMT
expires
Fri, 20 Dec 2019 10:04:46 GMT
last-modified
Thu, 01 Nov 2018 14:23:58 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, immutable, max-age=31536000
age
13694
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
activeview
pagead2.googlesyndication.com/pcs/
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssqWaVugweG8tnlkDiEMsPKZgpwhN5EwEhwTLjXT4cjPOdfb5JeqNZLFhrTninPLa59a5Br-q0uP9zFBIRpyXeNVbgAE2_Y0iwyTyI&sig=Cg0ArKJSzDbaI51oOwpaEAE&id=ampim&o=633,158&d=320,50&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=1790&tls=2791&g=100&h=100&pt=PAGE_LOAD_TIME&tt=2791&rpt=PAGE_LOAD_TIME&rst=NAV_TIMING(navigationStart)&r=v&adk=1325938609&avms=ampa
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 20 Dec 2018 13:53:01 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-31/html/ Frame 522D
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-31/html/container.html?n=0
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/v0/amp-ad-0.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:825::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-31/html/container.html?n=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
1737
date
Thu, 20 Dec 2018 10:04:46 GMT
expires
Fri, 20 Dec 2019 10:04:46 GMT
last-modified
Thu, 01 Nov 2018 14:23:58 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, immutable, max-age=31536000
age
13700
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
a
cloudapi.imrworldwide.com/nmapi/v2/C3E11FB8-EF45-4D94-A393-1BE694E98B4F/amp-3x8dEKUZxxqBUH9MpXjgMA_9172/
35 B
334 B
Image
General
Full URL
https://cloudapi.imrworldwide.com/nmapi/v2/C3E11FB8-EF45-4D94-A393-1BE694E98B4F/amp-3x8dEKUZxxqBUH9MpXjgMA_9172/a?b=%7B%22devInfo%22%3A%7B%22devId%22%3A%22amp-3x8dEKUZxxqBUH9MpXjgMA_9172%22%2C%22apn%22%3A%22Motherboard%22%2C%22apv%22%3A%221.0%22%2C%22apid%22%3A%22C3E11FB8-EF45-4D94-A393-1BE694E98B4F%22%7D%2C%22metadata%22%3A%7B%22static%22%3A%7B%22type%22%3A%22static%22%2C%22section%22%3A%22phishing%22%2C%22assetid%22%3A%229172%22%2C%22segA%22%3A%22%22%2C%22segB%22%3A%22%22%2C%22segC%22%3A%22Google%20AMP%22%2C%22adModel%22%3A%220%22%2C%22dataSrc%22%3A%22cms%22%7D%2C%22content%22%3A%7B%7D%2C%22ad%22%3A%7B%7D%7D%2C%22event%22%3A%22playhead%22%2C%22position%22%3A%221545313989026%22%2C%22data%22%3A%7B%22hidden%22%3A%220%22%2C%22blur%22%3A%220%22%2C%22position%22%3A%221545313989026%22%7D%2C%22type%22%3A%22static%22%2C%22utc%22%3A%221545313989026%22%2C%22index%22%3A%223%22%7D
Requested by
Host: motherboard.vice.com
URL: https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.125 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-125.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:53:10 GMT
via
1.1 bee9d99ac2913ec4167e166e6bdb691e.cloudfront.net (CloudFront)
last-modified
Wed, 28 Feb 2018 19:19:07 GMT
server
AmazonS3
etag
"c2196de8ba412c60c22ab491af7b1409"
x-cache
Error from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
35
x-amz-cf-id
d6OprZ-A5tBJEzVJ2OGvpD_ntwnjfVwzm-BMT_0SN7e_rklIZXyTHQ==
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=motherboard.tv&u=amp-pMmJfo1Ymi58x3ighbQ-IA(_cb)&g=8233&g0=en_us&g1=joseph-cox%7Cjason-koebler&g4=short-form&p=%2Fen_us%2Farticle%2Fbje3kw%2Fhow-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&d=motherboard.vice.com&c=120&x=0&y=6734&j=30&R=1&W=0&I=0&E=0&r=&t=9172amp-pMmJfo1Ymi58x3ighbQ-IA(_cb)&b=11872&i=How%20Hackers%20Bypass%20Gmail%202FA%20at%20Scale%20-%20Motherboard&T=1545313979075&tz=0&C=2&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.201.154.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-201-154-11.compute-1.amazonaws.com
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Thu, 20 Dec 2018 13:53:10 GMT
cache-control
no-cache, no-store, must-revalidate
expires
0
content-length
43
content-type
image/gif
pixel.gif
beacon.krxd.net/
0
453 B
Image
General
Full URL
https://beacon.krxd.net/pixel.gif?source=amp&confid=JLnYmGrt&_kpid=faf02c4a-1799-4d79-a1ff-c13b51ae2d53&_kcp_s=Motherboard%20-%20VICE%20O%26O&_kcp_sc=&_kcp_ssc=&_kcp_d=motherboard.vice.com&_kpref_=&_kua_kx_amp_client_id=amp-YfqZNFeOesRuzs0lcWWNIQ&_kua_kx_lang=en-us&_kua_kx_tech_browser_language=en-us&_kua_kx_tz=0&t_navigation_type=0&t_dns=67&t_tcp=42&t_http_request=95&t_http_response=17&t_content_ready=435&t_window_load=11872&t_redirect=0&_kpa_all_keywords=motherboard%2C%20technology%2C%20science%2C%20future%2C%20environment%2Ccybersecurity%2CYahoo!%2Cemail%2CGmail%2Cemail%20hack%2Ctwo-factor%20authentication%2Cspear%20phishing%2C2fa%2CGovernment%20Hackers&_kpa_url_path_1=en_us&_kpa_url_path_2=article&_kpa_url_path_3=bje3kw&_kpa_url_path_4=how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo&_kpa_gs_channels=cg_google_au&_kpa_gs_channels=gv_safe_core&_kpa_gs_channels=middle_east_safe&_kpa_gs_channels=cg_uksafe&_kpa_gs_channels=gs_tech&_kpa_gs_channels=nab_bank_exclude&_kpa_gs_channels=neg_us_battlefield&_kpa_gs_channels=neg_toyota&_kpa_gs_channels=gs_tech_computing&_kpa_gs_channels=gs_interest_male&_kpa_gs_channels=bundle_safety&_kpa_gs_channels=gv_crime&_kpa_gs_channels=neg_diageo_october_2018_brandsafety&_kpa_gs_channels=gs_interest_online_shoppers&_kpa_gs_channels=gs_tech_phones&_kpa_gs_channels=crime_low_all_lang&_kpa_gs_channels=gs_interest_frequent_travelers&_kpa_gs_channels=neg_cg_us_lexus&_kpa_gs_channels=gs_politics
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.228.181.107 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-228-181-107.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://motherboard.vice.com/amp/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 20 Dec 2018 13:53:10 GMT
Cache-Control
private, no-cache, no-store
X-Request-Time
D=99 t=1545313990
Connection
keep-alive
X-Served-By
beacon-n029-dub.krxd.net
P3P
policyref="https://cdn.krxd.net/kruxcontent/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
a
cloudapi.imrworldwide.com/nmapi/v2/C3E11FB8-EF45-4D94-A393-1BE694E98B4F/amp-3x8dEKUZxxqBUH9MpXjgMA_9172/
35 B
333 B
Image
General
Full URL
https://cloudapi.imrworldwide.com/nmapi/v2/C3E11FB8-EF45-4D94-A393-1BE694E98B4F/amp-3x8dEKUZxxqBUH9MpXjgMA_9172/a?b=%7B%22devInfo%22%3A%7B%22devId%22%3A%22amp-3x8dEKUZxxqBUH9MpXjgMA_9172%22%2C%22apn%22%3A%22Motherboard%22%2C%22apv%22%3A%221.0%22%2C%22apid%22%3A%22C3E11FB8-EF45-4D94-A393-1BE694E98B4F%22%7D%2C%22metadata%22%3A%7B%22static%22%3A%7B%22type%22%3A%22static%22%2C%22section%22%3A%22phishing%22%2C%22assetid%22%3A%229172%22%2C%22segA%22%3A%22%22%2C%22segB%22%3A%22%22%2C%22segC%22%3A%22Google%20AMP%22%2C%22adModel%22%3A%220%22%2C%22dataSrc%22%3A%22cms%22%7D%2C%22content%22%3A%7B%7D%2C%22ad%22%3A%7B%7D%7D%2C%22event%22%3A%22playhead%22%2C%22position%22%3A%221545313999028%22%2C%22data%22%3A%7B%22hidden%22%3A%220%22%2C%22blur%22%3A%220%22%2C%22position%22%3A%221545313999028%22%7D%2C%22type%22%3A%22static%22%2C%22utc%22%3A%221545313999028%22%2C%22index%22%3A%224%22%7D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.125 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-125.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 20 Dec 2018 13:53:20 GMT
via
1.1 bee9d99ac2913ec4167e166e6bdb691e.cloudfront.net (CloudFront)
last-modified
Wed, 28 Feb 2018 19:19:07 GMT
server
AmazonS3
etag
"c2196de8ba412c60c22ab491af7b1409"
x-cache
Error from cloudfront
content-type
image/gif
status
200
accept-ranges
bytes
content-length
35
x-amz-cf-id
IahV_iil2R-FFob7qSpxpILzC-TwFpYbunM2gXPsciu6YzveKN7zrQ==

Verdicts & Comments Add Verdict or Comment

25 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| AMP object| global object| AMP_CONFIG object| log object| __AMP__EXPERIMENT_TOGGLES object| AMPErrors object| AMP_MODE function| reportError object| services object| UrlCache boolean| AMP_TAG object| ampExtendedElements function| BaseCustomElementClass number| ampAdSlotIdCounter object| AMP_FAST_FETCH_SIGNATURE_VERIFIER_ object| experimentBranches object| goog_identity_prom number| ampAdGoogleIfiCounter object| gaGlobal number| ampAdPageCorrelator number| 3pla object| listeningFors

1 Cookies

Domain/Path Name / Value
.teads.tv/ Name: tt_viewer
Value: c32f50b7-7bbe-4dcf-907c-c38988658e94

7 Console Messages

Source Level URL
Text
console-api info URL: https://cdn.ampproject.org/v0.js(Line 540)
Message:
Powered by AMP ⚡ HTML – Version 1812131718380
console-api error URL: https://cdn.ampproject.org/v0.js(Line 130)
Message:
localStorage not supported.
console-api error URL: https://cdn.ampproject.org/v0.js(Line 130)
Message:
The type attribute is required.
console-api error URL: https://cdn.ampproject.org/v0.js(Line 130)
Message:
The type attribute is required.
console-api error URL: https://cdn.ampproject.org/v0.js(Line 130)
Message:
The type attribute is required.
console-api warning URL: https://cdn.ampproject.org/v0.js(Line 15)
Message:
Response unparseable or failed to send image request
console-api warning URL: https://cdn.ampproject.org/v0.js(Line 15)
Message:
Response unparseable or failed to send image request

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.vice.com *.viceland.com viceland.com viceland.nl vicesports.nl vicemoney.nl vicebelgique.com
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
amp-error-reporting.appspot.com
ampcid.google.com
ampcid.google.de
api.segment.io
beacon.krxd.net
cdn.ampproject.org
cdn.krxd.net
certify-amp.alexametrics.com
cloudapi.imrworldwide.com
motherboard.vice.com
pagead2.googlesyndication.com
ping.chartbeat.net
pixel.quantserve.com
prof.estat.com
sb.scorecardresearch.com
securepubads.g.doubleclick.net
stats.g.doubleclick.net
tpc.googlesyndication.com
uaid-linkage.imrworldwide.com
vice-web-statics-cdn.vice.com
video-images.vice.com
www.facebook.com
www.google-analytics.com
www.googletagmanager.com
143.204.101.125
143.204.101.26
151.101.0.175
151.101.1.132
151.101.192.175
172.217.18.98
23.57.19.23
2a00:1450:4001:808::200e
2a00:1450:4001:80b::2002
2a00:1450:4001:815::2008
2a00:1450:4001:81b::2014
2a00:1450:4001:81d::200e
2a00:1450:4001:81f::2002
2a00:1450:4001:820::2001
2a00:1450:4001:825::2001
2a00:1450:400c:c08::9b
2a03:2880:f11c:8083:face:b00c:0:25de
34.235.177.68
35.177.117.159
52.201.154.11
52.47.40.236
54.191.154.91
54.228.181.107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