URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Submission: On March 24 via api from US

Summary

This website contacted 58 IPs in 6 countries across 39 domains to perform 211 HTTP transactions. The main IP is 3.130.45.15, located in Columbus, United States and belongs to AMAZON-02, US. The main domain is arstechnica.com.
TLS certificate: Issued by Amazon on January 26th 2020. Valid for: a year.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 3.130.45.15 16509 (AMAZON-02)
16 205.234.175.175 30081 (CACHENETW...)
4 2a00:1450:400... 15169 (GOOGLE)
3 143.204.213.153 16509 (AMAZON-02)
6 95.101.185.51 20940 (AKAMAI-ASN1)
25 95.101.185.246 20940 (AKAMAI-ASN1)
1 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
6 172.217.16.194 15169 (GOOGLE)
1 143.204.201.109 16509 (AMAZON-02)
3 99.86.3.40 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
3 151.139.128.10 20446 (HIGHWINDS3)
6 2a00:1450:400... 15169 (GOOGLE)
3 95.101.185.159 20940 (AKAMAI-ASN1)
2 3.220.246.137 14618 (AMAZON-AES)
2 143.204.208.131 16509 (AMAZON-02)
1 52.19.88.177 16509 (AMAZON-02)
2 151.101.12.239 54113 (FASTLY)
5 2a00:1450:400... 15169 (GOOGLE)
1 52.213.78.12 16509 (AMAZON-02)
1 3 35.190.59.101 15169 (GOOGLE)
3 35.201.67.47 15169 (GOOGLE)
9 152.195.132.202 15133 (EDGECAST)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 13.92.139.214 8075 (MICROSOFT...)
14 52.202.152.193 14618 (AMAZON-AES)
1 34.205.105.54 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.22.87.69 14618 (AMAZON-AES)
2 52.23.50.9 14618 (AMAZON-AES)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.190.40.172 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
1 2a02:2638::3 44788 (ASN-CRITE...)
1 54.229.6.20 16509 (AMAZON-02)
1 143.204.201.65 16509 (AMAZON-02)
25 143.204.179.185 16509 (AMAZON-02)
7 72.247.226.107 16625 (AKAMAI-AS)
1 34.232.138.226 14618 (AMAZON-AES)
3 2a00:1450:400... 15169 (GOOGLE)
4 13.35.254.113 16509 (AMAZON-02)
2 64.202.112.31 22075 (AS-OUTBRAIN)
1 151.101.114.2 54113 (FASTLY)
4 34.231.184.25 14618 (AMAZON-AES)
1 50.31.142.63 22075 (AS-OUTBRAIN)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f01... 32934 (FACEBOOK)
5 143.204.201.121 16509 (AMAZON-02)
1 172.217.22.2 15169 (GOOGLE)
1 35.244.174.68 15169 (GOOGLE)
1 2a03:2880:f01... 32934 (FACEBOOK)
2 69.173.144.143 26667 (RUBICONPR...)
2 178.250.0.165 44788 (ASN-CRITE...)
4 152.199.21.89 15133 (EDGECAST)
211 58
Apex Domain
Subdomains
Transfer
36 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
1 MB
26 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
172 KB
23 condenastdigital.com
pixel.condenastdigital.com
capture.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
wren.condenastdigital.com
22 KB
16 arstechnica.net
cdn.arstechnica.net
643 KB
9 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
53 KB
9 cookielaw.org
cdn.cookielaw.org
165 KB
9 skimresources.com
s.skimresources.com
r.skimresources.com
t.skimresources.com
p.skimresources.com
18 KB
8 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
pubads.g.doubleclick.net
101 KB
7 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
11 KB
6 google-analytics.com
www.google-analytics.com
19 KB
5 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-chidc2.outbrain.com
54 KB
5 cnevids.com
player.cnevids.com
api.cnevids.com
63 KB
4 advertising.com
adserver-us.adtech.advertising.com
730 B
4 casalemedia.com
as-sec.casalemedia.com
2 KB
4 google.com
adservice.google.com
ampcid.google.com
www.google.com
1 KB
3 googleapis.com
imasdk.googleapis.com
114 KB
3 google.de
adservice.google.de
ampcid.google.de
www.google.de
758 B
3 amazon-adsystem.com
c.amazon-adsystem.com
29 KB
2 criteo.com
bidder.criteo.com
290 B
2 rubiconproject.com
fastlane.rubiconproject.com
1 KB
2 facebook.net
connect.facebook.net
143 KB
2 parsely.com
srv-2020-03-24-16.config.parsely.com
srv-2020-03-24-16.pixel.parsely.com
886 B
2 polarcdn-terrax.com
polarcdn-terrax.com
596 B
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
130 KB
2 actionbutton.co
embed.actionbutton.co
api.actionbutton.co
55 KB
2 indexww.com
js-sec.indexww.com
37 KB
2 googletagservices.com
www.googletagservices.com
42 KB
2 arstechnica.com
arstechnica.com
15 KB
1 facebook.com
an.facebook.com
1 KB
1 rlcdn.com
api.rlcdn.com
203 B
1 2mdn.net
s0.2mdn.net
10 KB
1 rkdms.com
mid.rkdms.com
1 adsrvr.org
match.adsrvr.org
542 B
1 criteo.net
static.criteo.net
30 KB
1 onetrust.com
geolocation.onetrust.com
519 B
1 1trust.app
geolocation.1trust.app
548 B
1 consensu.org
api.skimlinks.mgr.consensu.org
636 B
1 zqtk.net
segment-data.zqtk.net
564 B
1 googletagmanager.com
www.googletagmanager.com
72 KB
211 39
Domain Requested by
25 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
23 px.moatads.com arstechnica.com
16 cdn.arstechnica.net arstechnica.com
14 capture.condenastdigital.com arstechnica.com
9 cdn.cookielaw.org www.googletagmanager.com
cdn.cookielaw.org
arstechnica.com
6 images.outbrainimg.com arstechnica.com
6 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
arstechnica.com
6 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
5 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
5 tpc.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
4 adserver-us.adtech.advertising.com js-sec.indexww.com
4 as-sec.casalemedia.com js-sec.indexww.com
4 wren.condenastdigital.com cdn.arstechnica.net
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 t.skimresources.com arstechnica.com
s.skimresources.com
3 r.skimresources.com 1 redirects arstechnica.com
3 widgets.outbrain.com cdn.arstechnica.net
widgets.outbrain.com
3 player.cnevids.com arstechnica.com
cdn.arstechnica.net
player.cnevids.com
3 c.amazon-adsystem.com arstechnica.com
c.amazon-adsystem.com
2 bidder.criteo.com static.criteo.net
2 fastlane.rubiconproject.com js-sec.indexww.com
2 pagead2.googlesyndication.com securepubads.g.doubleclick.net
2 connect.facebook.net d2c8v52ll5s99u.cloudfront.net
connect.facebook.net
2 log.outbrainimg.com widgets.outbrain.com
2 4d.condenastdigital.com pixel.condenastdigital.com
2 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
2 p.skimresources.com arstechnica.com
2 pixel.condenastdigital.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 z.moatads.com arstechnica.com
d2c8v52ll5s99u.cloudfront.net
2 js-sec.indexww.com arstechnica.com
2 www.googletagservices.com arstechnica.com
securepubads.g.doubleclick.net
2 arstechnica.com cdn.arstechnica.net
1 an.facebook.com js-sec.indexww.com
1 api.rlcdn.com js-sec.indexww.com
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 s0.2mdn.net imasdk.googleapis.com
1 mcdp-chidc2.outbrain.com widgets.outbrain.com
1 odb.outbrain.com widgets.outbrain.com
1 srv-2020-03-24-16.pixel.parsely.com arstechnica.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 mid.rkdms.com js-sec.indexww.com
1 match.adsrvr.org js-sec.indexww.com
1 static.criteo.net js-sec.indexww.com
1 geolocation.onetrust.com cdn.cookielaw.org
1 geolocation.1trust.app cdn.cookielaw.org
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 www.google.de arstechnica.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 infinityid.condenastdigital.com pixel.condenastdigital.com
1 ampcid.google.de www.google-analytics.com
1 srv-2020-03-24-16.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 api.actionbutton.co embed.actionbutton.co
1 ampcid.google.com www.google-analytics.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 mb.moatads.com z.moatads.com
1 segment-data.zqtk.net arstechnica.com
1 s.skimresources.com arstechnica.com
1 cdn.mediavoice.com arstechnica.com
1 embed.actionbutton.co arstechnica.com
1 adservice.google.de www.googletagservices.com
1 www.googletagmanager.com arstechnica.com
211 66
Subject Issuer Validity Valid
*.arstechnica.com
Amazon
2020-01-26 -
2021-02-26
a year crt.sh
*.cachefly.net
GlobalSign RSA OV SSL CA 2018
2020-02-06 -
2021-10-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.actionbutton.co
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2020-06-27
a year crt.sh
*.cnevids.com
Amazon
2020-01-22 -
2020-11-16
10 months crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2020-03-09 -
2021-06-08
a year crt.sh
cnevideos.com
Amazon
2020-01-13 -
2021-02-13
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-10-31 -
2020-08-07
9 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
sa437gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-05-17 -
2020-08-19
2 years crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2020-02-21 -
2020-08-29
6 months crt.sh
*.config.parsely.com
Amazon
2020-01-28 -
2021-02-28
a year crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
www.google.de
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
1trust.app
CloudFlare Inc ECC CA-2
2020-01-06 -
2020-10-09
9 months crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-12-03 -
2021-04-06
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2017-10-09 -
2020-10-30
3 years crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2020-01-31 -
2020-04-30
3 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-03-03 -
2020-07-25
5 months crt.sh
*.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-03-01 -
2020-05-30
3 months crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-04-24 -
2020-04-23
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.criteo.com
DigiCert ECC Secure Server CA
2019-12-05 -
2021-04-08
a year crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh

This page contains 11 frames:

Primary Page: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Frame ID: C596F5FCCEAE22516FB04D581483DA26
Requests: 190 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: C6FC22F0B54AA1F0D3680B438FE24FA8
Requests: 1 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.9445375506254308
Frame ID: 8317CCF64B318AE16DF14F1AB67A0F35
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: 8FF129573872DC2FCBA3FDE760AA46FB
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/nanoWidget/externals/cookie/put.html
Frame ID: DF9ECF39FB27FE877DE2D1F059D61D80
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: DB5F0A4F2006620C96F3AC985037A335
Requests: 26 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: EA709F94784DDA03F3D94177FA661A4D
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: A75192EEB110DD23C791D7B3395CEBC8
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: 9C35BA7505F2CC8BE6A8E73B75260982
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.376.3_en.html
Frame ID: F1B7BDC7AC8A7A6DBFCD656B30EFEEE3
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 69E3CDD917298B2B00B24A079E0A0A8F
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<!-- (?:End )?Google Tag Manager -->/i

Page Statistics

211
Requests

99 %
HTTPS

32 %
IPv6

39
Domains

66
Subdomains

58
IPs

6
Countries

3184 kB
Transfer

7797 kB
Size

25
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 53
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01E46Q2H4MNK1P7PRH5KB1YNFQ&persistence=1&checksum=bc5439d5fb3755bd2eac06157fe52eb9afd3b97bfad8d8710c4cd76749076c90
Request Chain 78
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j81&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&gjid=848590031&_gid=1583715159.1585068459&_u=aChAgUAjAAQC~&z=1405421001 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&_v=j81&z=1405421001 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&_v=j81&z=1405421001&slf_rd=1&random=1460726748

211 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
42 KB
14 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.130.45.15 Columbus, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-130-45-15.us-east-2.compute.amazonaws.com
Software
nginx/1.17.9 / PHP/7.3.15
Resource Hash
69400534df107cd63c724e7f00fd15cc28069872ff4fe2a53d90f9f30e531bc3
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
document
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

status
200
date
Tue, 24 Mar 2020 16:47:38 GMT
content-type
text/html; charset=UTF-8
server
nginx/1.17.9
x-powered-by
PHP/7.3.15
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
content-encoding
gzip
main-532e43a155.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
334 KB
69 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5ad2dd79dd70a3e9c03fcb2644b3dec3852424e0c5010a9054012304efe35b82

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
70509
x-cf-tsc
1583790251
x-cf2
H
last-modified
Mon, 09 Mar 2020 21:20:33 GMT
server
CFS 0215
x-cff
B
etag
W/"5e66b321-53851"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
21
accept-ranges
bytes
x-cf-rand
26.510
expires
Tue, 19 May 2020 16:47:38 GMT
gpt.js
www.googletagservices.com/tag/js/
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1a4f0e8c39215f22253ccbba8d94aaf7d5cce967a7f746234af6750de3df5af3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"465 / 837 of 1000 / last-modified: 1585062257"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
14409
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:38 GMT
apstag.js
c.amazon-adsystem.com/aax2/
87 KB
25 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.213.153 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-213-153.fra53.r.cloudfront.net
Software
Server /
Resource Hash
ac2a58f9d55c4642121cfb6f7e213cbc882bbdd75ef171ca8a07ed982ef693ce

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 22:00:54 GMT
content-encoding
gzip
server
Server
age
67603
etag
1dcfbf3986ee8b9c3abbc67eb808ab43
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
x-amz-cf-id
5zt7D_oZeRl10MG857mrRBXn-BUGVSWC9eFreO2HKN5gzShtnnqdiQ==
via
1.1 d01ad8df731d3f120823f9e20df55147.cloudfront.net (CloudFront)
183973-1558632223658.js
js-sec.indexww.com/ht/p/
131 KB
37 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
00bd8c0d8620137ed2914b1958e62e894392f208c2f989e158565d9bb508e2fb

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 16:46:14 GMT
Server
Apache
ETag
"da2c86-20bd1-5a19c7d60a2d8"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3588
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
37951
Expires
Tue, 24 Mar 2020 17:47:27 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
187 KB
66 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
0eb438ad4233f9cdadd2cf6e5e3544a29b1e693a03f45b0b9fa25e70f2675917

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 23:07:10 GMT
server
AmazonS3
x-amz-request-id
C4EB885645F7EADB
etag
"36eff026ea983609efb74e7f83fac3f5"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=26109
accept-ranges
bytes
content-length
67412
x-amz-id-2
0OuSBOQTL5bWL5GbKshqc8LH0N1zUvVKyRv9aIh2fHkVjjuH49AGM6AVvGrpdrcS27mrdbb8wc4=
ars-technica.min.js
cdn.arstechnica.net/cns/
137 KB
45 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/ars-technica.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
cb332c513481e682f5a087a5be5f3956277cc4f940568a872ab87c14ad536443
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cf3
H
x-amz-request-id
0F95B3749A7398F5
x-cf1
14961:fA.ams1:co:1576089267:cacheN.ams1-01:H
status
200
vary
Accept-Encoding
content-length
44956
x-amz-id-2
ajkWxixt4A1iCbTA0ahKTIgmGyV8vIjqPP/LTsy/MBw1+D6H1gZR6N/NQD2Kdb/U8x/Xh1MNAak=
x-cf-tsc
1581020468
cf4ttl
43200.000
x-cf2
H
expires
Wed, 25 Mar 2020 16:47:38 GMT
last-modified
Thu, 30 Jan 2020 22:03:26 GMT
server
CFS 0215
x-timer
S1581010250.410338,VS0,VE61
x-cff
B
etag
"06d02814d9b071f29951bf3adbc5eca2"
x-served-by
cache-bwi5057-BWI
x-frame-options
SAMEORIGIN
content-type
application/javascript
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=86400
cf4age
10217
x-amz-version-id
ztCM6GSJ.kG8cN67f93sCUGypNpsY0jZ
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
82.981
x-cache-hits
0
ars-bcfee6c82a.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
4 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-bcfee6c82a.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1581035284:cacheN.ams1-01:H
status
200
content-length
1415
x-cf-tsc
1581035298
x-cf2
H
last-modified
Thu, 06 Feb 2020 21:26:43 GMT
server
CFS 0215
x-cff
B
etag
W/"5e3c8493-e66"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
6
accept-ranges
bytes
x-cf-rand
86.720
expires
Tue, 19 May 2020 16:47:38 GMT
gtm.js
www.googletagmanager.com/
299 KB
72 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
fc5bd484d8da5a8a2662e09c44be9429c05da06812877db42ff1ceb459c97f6d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
br
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
server
Google Tag Manager
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, max-age=900
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
access-control-allow-headers
Cache-Control
content-length
73722
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:38 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020030501.js
securepubads.g.doubleclick.net/gpt/
165 KB
60 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
8ee04e0441c9e51785d17ac835a93cf4d30d90826f87350b42ba233496a26f55
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
61481
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:38 GMT
ads.js
arstechnica.com/hotzones/src/
0
502 B
XHR
General
Full URL
https://arstechnica.com/hotzones/src/ads.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.130.45.15 Columbus, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-130-45-15.us-east-2.compute.amazonaws.com
Software
nginx/1.17.9 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
last-modified
Thu, 19 Mar 2020 01:01:08 GMT
server
nginx/1.17.9
etag
"5e72c454-0"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
content-length
0
x-xss-protection
1; mode=block
windows-10-s-wallpaper-800x450.jpg
cdn.arstechnica.net/wp-content/uploads/2019/07/
17 KB
17 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2019/07/windows-10-s-wallpaper-800x450.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
a27ba461461cf227fad341e7e38f9e0f5d274734770950af435e8ff068ffa242
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
x-amz-request-id
479C887A0B68F7A3
x-cf1
14961:fA.ams1:co:1563987225:cacheN.ams1-01:H
status
200
content-length
17001
x-amz-id-2
gBrgY1CJqN3XKT+l8knK/gMzq3DuQk3DTJWESr1fgavad3LE+yvjWkzSeFiS1Od+uwP+ujABim0=
x-cf-tsc
1584992435
cf4ttl
43200.000
x-cf2
H
last-modified
Sat, 21 Dec 2019 02:23:25 GMT
server
CFS 0215
x-cff
B
etag
"0807eb16e6b00958b8d3eb0bdb44fe2e"
x-frame-options
SAMEORIGIN
x-amz-version-id
null
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=4838400
cf4age
34323
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
content-type
image/jpeg
x-cf-rand
88.418
expires
Tue, 19 May 2020 16:47:38 GMT
main-a9491fb9a9.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
661 KB
215 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-a9491fb9a9.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
64b150557a256ebf3a5107e1c57c07d53ce1d4e1b0f9b071e06f79a2d90d0cc8

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
219295
x-cf-tsc
1583790251
x-cf2
H
last-modified
Mon, 09 Mar 2020 21:20:33 GMT
server
CFS 0215
x-cff
B
etag
W/"5e66b321-a5550"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
21
accept-ranges
bytes
x-cf-rand
3.779
expires
Tue, 19 May 2020 16:47:38 GMT
widget.min.js
embed.actionbutton.co/widget/
55 KB
55 KB
Script
General
Full URL
https://embed.actionbutton.co/widget/widget.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.109 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-201-109.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a0f2e67814972971051d665122897ed9b975ed6f1ce459ee539be3bbfcefb443

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 14:23:21 GMT
Via
1.1 7549433a09d06354ea864d169b689e51.cloudfront.net (CloudFront)
Last-Modified
Tue, 24 Mar 2020 14:23:15 GMT
Server
AmazonS3
Age
8657
ETag
"5c6896546451fdf50508bb00c5f494db"
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Cache-Control
no-cache
X-Amz-Cf-Pop
FRA53-C1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
56133
X-Amz-Cf-Id
_b-1sQqWw58wf1VVqcEn0d_LwHhl6ryHU48SFJ4q_uvH36n4sTzYxw==
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.40 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-40.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
02a9db289d960e3196e2269632ee772bbcb51333e9ab3503105ae7f3b1665062
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:46:42 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
56
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
27527
X-XSS-Protection
1; mode=block
X-Request-Id
c2be4e88-2b8f-4f30-aa79-61e8e72c32b3
X-Runtime
0.015210
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"78b772e91fb341302fbe1e68a3e427d8"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 d3039ad83798b26ecb9f9f1e666afe27.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Pop
FRA6-C1
X-Amz-Cf-Id
2UocKU3ngcqyARUnXJva9J2V14Njwa1tLaLRogP-Gl211F3CsJ4rWw==
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
cf-cache-status
HIT
age
2095
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1873236620 1872625354
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
5791e00c1f593250-FRA
100098X1555750.skimlinks.js
s.skimresources.com/js/
41 KB
16 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
55953987d8104311838ce0414adb751e86b32a69a9cbb441381ef67f1c4bbbb2

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
content-encoding
gzip
last-modified
Thu, 12 Mar 2020 11:43:35 GMT
server
AmazonS3
x-amz-request-id
895846C593CE8C11
etag
"d061a130936c12bec6f7b673c7e2b811"
x-hw
1585068458.cds066.am5.hn,1585068458.cds114.am5.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15820
x-amz-id-2
tGdNZAXJnF46NyukkfrpJcHDCvahwGfjyI5oXsDhaZfX1HZ+j/0Fe80T4pOXAqgqOZgwafqL/wY=
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.213.153 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-213-153.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 08:38:41 GMT
content-encoding
gzip
vary
Origin
age
29337
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 05 Mar 2020 08:28:46 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 e7377cc861b31102786678df3616bf69.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA53-C1
x-amz-cf-id
ec6MhnatGl6aJym3Qz6_DBgx9kBz8Il1OSwUngrkqMIUtQupodhpYQ==
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
Dang.jpg
cdn.arstechnica.net/wp-content/uploads/2018/10/
90 KB
91 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2018/10/Dang.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
d6f350f62fc19bfd7091e3841649be70e806fb94c00a1f777dbed2ea8ecc9daa
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
x-amz-request-id
42983F945D279926
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
92486
x-amz-id-2
qo9NoG/nlrK7tuxpnFKRsqEaYZg3Pqa0mEI0Zbmai27PDNiG4ZudscZEmEUGUl67KMNE3GfmiTo=
x-cf-tsc
1584910832
cf4ttl
43200.000
x-cf2
H
last-modified
Sat, 21 Dec 2019 01:48:48 GMT
server
CFS 0215
x-cff
B
etag
"03e5fec9e7ca5f8064d945bd791bd4c3"
x-frame-options
SAMEORIGIN
x-amz-version-id
null
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=4838400
cf4age
1197
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
content-type
image/jpeg
x-cf-rand
6.506
expires
Tue, 19 May 2020 16:47:38 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
4809
x-xss-protection
1; mode=block
x-cf-tsc
1581020472
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-12c9"
x-frame-options
SAMEORIGIN
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10179
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
98.878
expires
Tue, 19 May 2020 16:47:38 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
26 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
25592
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-63f8"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10339
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
34.589
expires
Tue, 19 May 2020 16:47:38 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
24264
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-5ec8"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10362
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
4.831
expires
Tue, 19 May 2020 16:47:38 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
24212
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-5e94"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10362
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
30.909
expires
Tue, 19 May 2020 16:47:38 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
22872
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-5958"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10339
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
80.694
expires
Tue, 19 May 2020 16:47:38 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
18972
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-4a1c"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
9732
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
47.682
expires
Tue, 19 May 2020 16:47:38 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
20872
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-5188"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
9732
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
37.590
expires
Tue, 19 May 2020 16:47:38 GMT
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
18824
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-4988"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10362
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
14.405
expires
Tue, 19 May 2020 16:47:38 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
20 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
19516
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-4c3c"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
9652
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
45.196
expires
Tue, 19 May 2020 16:47:38 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS, US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-532e43a155.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:38 GMT
x-content-type-options
nosniff
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
22104
x-xss-protection
1; mode=block
x-cf-tsc
1581020464
x-cf2
H
last-modified
Mon, 03 Feb 2020 21:50:35 GMT
server
CFS 0215
x-cff
B
etag
"5e3895ab-5658"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
9652
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
accept-ranges
bytes
x-cf-rand
22.391
expires
Tue, 19 May 2020 16:47:38 GMT
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
543
date
Tue, 24 Mar 2020 16:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Tue, 24 Mar 2020 18:38:35 GMT
outbrain.js
widgets.outbrain.com/
127 KB
43 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1585068458938
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-a9491fb9a9.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.159 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-159.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
261a19e0b5e0ea17eba957dd00e190b9f3535efd6c4ca874c625fd66fc35d0a3

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 13:49:50 GMT
ETag
W/"1fbdf-QnIZZORs2ktq6dUpgBDVRFMcYLI"
Vary
Accept-Encoding
Edge-Cache-Tag
widget-cheetah
Content-Type
application/x-javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Transfer-Encoding
chunked
Access-Control-Allow-Methods
GET,POST
Connection
keep-alive, Transfer-Encoding
Access-Control-Allow-Credentials
false
Timing-Allow-Origin
*
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-a9491fb9a9.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.220.246.137 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-220-246-137.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
5e5adf6f3067a94181543155e349c4b4059feca0670da7be23f539f9c08ea34f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
663
X-XSS-Protection
1; mode=block
X-Request-Id
18e0ffed-c9a4-4309-9de8-47515d73c5e9
X-Runtime
0.002088
X-Backend-Node
10.110.44.187
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"40bcd3f2b126492575a7c3e18c68a579"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.208.131 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-208-131.fra53.r.cloudfront.net
Software
nginx /
Resource Hash
2f17ab3ac118eeddb8ac29b08b41a35c0a5f6cdb4a94097c69a36569c5e4d87e

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 01:24:03 GMT
Content-Encoding
gzip
Age
58899
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Mon, 16 Mar 2020 20:58:13 GMT
Server
nginx
ETag
W/"5e6fe865-19d2"
Content-Type
application/x-javascript
Via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
g0y2gC9Nrne1yelnN_xcnLTVYwH8DBytCjO0y3G4-KG32IN7w_i3hg==
Expires
Wed, 25 Mar 2020 00:25:56 GMT
conde-nast
segment-data.zqtk.net/
759 B
564 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.19.88.177 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-19-88-177.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
4c849d13455fdf6ce1e23a0b84be7e6e72fdb3691c77cf949368d6e86f6eb955

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 19:40:37 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
application/javascript; charset=UTF-8
Connection
keep-alive
Content-Length
269
Expires
Wed, 25 Mar 2020 19:40:37 GMT
ixmatch.html
js-sec.indexww.com/um/ Frame C6FC
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"74087b-112-55254ff6699bb"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Tue, 24 Mar 2020 16:47:39 GMT
Connection
keep-alive
ars-technica.config.js
pixel.condenastdigital.com/config/v2/production/
6 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/ars-technica.config.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
50ef3043544193fed57957cde3087cb24a4af2a605c37a6ddc4c11105ac7bbe0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
Age
51971
Via
1.1 varnish, 1.1 varnish
X-Cache
MISS, HIT
X-Cache-Hits
0, 207
Connection
keep-alive
Content-Length
1151
x-amz-id-2
ITo7KklX/OsJa28NOAepmGqGmZ5+ObSbbJ+qFh4ShK18ZAifo7V+hoXPpwsNJxUCVfRqYgi/z6o=
X-Served-By
cache-iad2135-IAD, cache-fra19154-FRA
Last-Modified
Wed, 05 Feb 2020 18:01:17 GMT
Server
AmazonS3
X-Timer
S1585068459.049126,VS0,VE0
ETag
"b2d7ed50cf3dbf4d93df75f579b3a6b4"
Vary
Accept-Encoding
x-amz-request-id
AD6C37A989D0117F
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Tue, 25 Feb 2020 07:45:38 GMT
ads
securepubads.g.doubleclick.net/gampad/
418 B
386 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2443323947283421&correlator=456661660470285&output=ldjh&impl=fifs&adsid=NT&eid=21065353&vrg=2020030501&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200324&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.32.6%26ctx_page_slug%3Dattackers-exploit-windows-zeroday-that-can-execute-malicious-code%26cnt_tags%3Dexploits%252Cflaw%252Cmicrosoft-3%252Cvulnerabilities%252Cwindows%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1585068459&dt=1585068459007&dlt=1585068458712&idt=188&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=0&adks=2746652139&ucis=1&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&dssz=31&icsg=8600944640&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x1&msz=1585x1&ga_vid=626944428.1585068459&ga_sid=1585068459&ga_hid=160008911&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
0b4d125a2b2936e3ebd0d1c51a77cb6b22372255e288c86e5abda6a13bd70cc3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
208
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020030501.js
securepubads.g.doubleclick.net/gpt/
69 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
ffdc18ac8f47bcd50dd9c33532c334e7073717a62b367d95b9cb1561048547dc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
25689
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:39 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

ads
securepubads.g.doubleclick.net/gampad/
419 B
715 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2443323947283421&correlator=456661660470285&output=ldjh&impl=fifs&adsid=NT&eid=21065353&vrg=2020030501&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200324&iu_parts=3379%2Cconde.ars.native%2Clegacy%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=2x2&prev_scp=pos%3Dlegacy%26ctx_slot_type%3Dnative_xrail%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnative_xrail_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.32.6%26ctx_page_slug%3Dattackers-exploit-windows-zeroday-that-can-execute-malicious-code%26cnt_tags%3Dexploits%252Cflaw%252Cmicrosoft-3%252Cvulnerabilities%252Cwindows%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1585068459&dt=1585068459018&dlt=1585068458712&idt=188&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=661&adks=2072965525&ucis=2&ifi=2&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&dssz=32&icsg=2207624200192&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x0&msz=300x2&ga_vid=626944428.1585068459&ga_sid=1585068459&ga_hid=160008911&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
2c4a557b0ef535625185bd7879b9ae0fe7bf32a8a96cee0163fbeff409e14079
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
206
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
yi.js
mb.moatads.com/
1 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_8802711
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.78.12 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-213-78-12.eu-west-1.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
56639fff26cf70ea42a5fdfd5be75c8cddf9779b47468f64585987c074475f0a

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
server
TornadoServer/4.5.3
etag
"6c44e5c5d87950a46c06fbe3920e7ce34827144a"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1463
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1585068459028&de=875187791013&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&ac=1&bq=11&f=0&na=287246740&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:39 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01E46Q2H4MNK1P7PRH5KB1YNFQ&persistence=1&checksum=bc5439d5fb3755bd2eac06157fe52eb9afd3b97bfad8d8710c4cd76749076c90
0
-1 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01E46Q2H4MNK1P7PRH5KB1YNFQ&persistence=1&checksum=bc5439d5fb3755bd2eac06157fe52eb9afd3b97bfad8d8710c4cd76749076c90
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
https://r.skimresources.com/api/?xguid=01E46Q2H4MNK1P7PRH5KB1YNFQ&persistence=1&checksum=bc5439d5fb3755bd2eac06157fe52eb9afd3b97bfad8d8710c4cd76749076c90
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
307
access-control-allow-credentials
true
strict-transport-security
max-age=31536000
content-type
text/html
alt-svc
clear
content-length
193

Redirect headers

date
Tue, 24 Mar 2020 16:47:39 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
https://r.skimresources.com/api/?xguid=01E46Q2H4MNK1P7PRH5KB1YNFQ&persistence=1&checksum=bc5439d5fb3755bd2eac06157fe52eb9afd3b97bfad8d8710c4cd76749076c90
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000
content-type
text/html
alt-svc
clear
content-length
193
robots.txt
t.skimresources.com/api/v2/ Frame 8317
0
105 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.9445375506254308
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
206
date
Tue, 24 Mar 2020 16:47:39 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
text/plain charset=UTF-8
px.gif
p.skimresources.com/
43 B
495 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=3.8909651521839033
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
status
200
x-guploader-uploadid
AEnB2UpL16Qc1ZLNX4wu13KFvytuiI1alNK6AYTqSvoUjdTYBGw6xhc1OwB_lHwplmgy9Z5N79khciM_AljRIM9bXgFaN8PRmg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1585068459.cds066.am5.hn,1585068459.cds132.am5.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=3.8909651521839033
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
status
200
x-guploader-uploadid
AEnB2UpL16Qc1ZLNX4wu13KFvytuiI1alNK6AYTqSvoUjdTYBGw6xhc1OwB_lHwplmgy9Z5N79khciM_AljRIM9bXgFaN8PRmg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1585068459.cds066.am5.hn,1585068459.cds132.am5.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
11 KB
4 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8AAA) /
Resource Hash
8e00ebebe053ff93e139bab1a80ced2517b33572ab374ae641e0e1cfed58d8e0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
N1nkxqP8FRR4U7sOR6dsSg==
age
7547
x-cache
HIT
status
200
content-length
3742
x-ms-lease-status
unlocked
last-modified
Wed, 18 Mar 2020 20:41:16 GMT
server
ECAcc (ama/8AAA)
etag
0x8D7CB7CB4C4B02D
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
e660368d-301e-0038-6dea-0199bf000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 24 Mar 2020 20:47:39 GMT
plugin.js
plugin.mediavoice.com/
343 KB
127 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
17cfd03c7324bff29a75eed9529fb31764b922489e32030d4acabea1cc5a216f

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
cf-cache-status
HIT
age
8383
cf-ray
5791e00dbd143250-FRA
status
200
content-length
129661
via
1.1 varnish
x-varnish
2150463358 2150463343
last-modified
Mon, 23 Mar 2020 14:27:53 GMT
server
cloudflare
etag
W/"5e78c769-55b9e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Wed, 25 Mar 2020 02:27:56 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
596 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=3600
x-country
DE
cf-ray
5791e00dd926c2e0-FRA
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
928 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:17:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
1785
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Tue, 24 Mar 2020 17:17:54 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
549 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
TrackTrending
api.actionbutton.co/api/Widget/
0
0
Fetch
General
Full URL
https://api.actionbutton.co/api/Widget/TrackTrending?articleUrl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F
Requested by
Host: embed.actionbutton.co
URL: https://embed.actionbutton.co/widget/widget.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
13.92.139.214 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=2592000

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Strict-Transport-Security
max-age=2592000
Server
Microsoft-IIS/10.0
X-Powered-By
ASP.NET
Date
Tue, 24 Mar 2020 16:47:39 GMT
Request-Context
appId=cid-v1:0b4797de-9039-4ef9-b070-23a8f2b96fb5
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&t=1585068459028&de=875187791013&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&ac=1&bq=11&f=0&zn=0&na=1940959147&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:39 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pID=&sID=&uId=&xid=&_ts=2020-03-24T16%3A47%3A39.162Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22unsupported%20template%22%2C%22pageTemplate%22%3A%22article%7Creport%22%2C%22url%22%3A%22information-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%7D&dim3=Availability%3A%20unsupported%20template
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a4a43521cee4006a9d54ffc1e769752ea89ea213e5474e886a32a5b7613163c3

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
Age
523748
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
1, 12852
Connection
keep-alive
Content-Length
13530
x-amz-id-2
V7K8JplftiA2s1suZXvyVzNbacQoab1VNwREgJOCYWoFuujHKSy99OilwFaojZkynDTbjoCTSmI=
X-Served-By
cache-iad2149-IAD, cache-fra19154-FRA
Last-Modified
Wed, 05 Feb 2020 15:16:27 GMT
Server
AmazonS3
X-Timer
S1585068459.172999,VS0,VE0
ETag
"e6435598257a425dcb2054251b81b21a"
Vary
Accept-Encoding
x-amz-request-id
AD73D82969378DC2
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Wed, 05 Feb 2020 21:18:34 GMT
/
r.skimresources.com/api/
167 B
508 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01E46Q2H4MNK1P7PRH5KB1YNFQ&persistence=1&checksum=bc5439d5fb3755bd2eac06157fe52eb9afd3b97bfad8d8710c4cd76749076c90
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
22bdb6e5fc9974dd93c6b079be8f58e5db27ca1913204aeca12fd60669b026aa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000
content-type
application/json
alt-svc
clear
via
1.1 google
arstechnica.com
srv-2020-03-24-16.config.parsely.com/config/
415 B
657 B
Script
General
Full URL
https://srv-2020-03-24-16.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.205.105.54 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-205-105-54.compute-1.amazonaws.com
Software
/ Express
Resource Hash
789e1c38d46b7679ae34e63db23e34d6a1549b7200791711af540bffa102e9d6

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:23 GMT
Cache-Control
private, no-cache
Connection
keep-alive
X-Powered-By
Express
ETag
W/"19f-rVNVpsYusgslQzgxxKrSBQ"
Content-Length
415
Content-Type
text/javascript; charset=utf-8
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1585068459028&de=875187791013&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=native_xrail_0&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&ac=1&bq=11&f=0&zn=0&na=542697690&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:39 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
478 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1585068459201
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.22.87.69 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-22-87-69.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
c5cfe8ae8b4a1d3320c2e4ae97d7f97b8d6ee0c9db4a320a4d37bbd48671a744

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.23.50.9 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-23-50-9.compute-1.amazonaws.com
Software
/
Resource Hash
b3fa7308fcd897fd97dfccfbf4d78054d131f3e8761d85ca17c08b36757ef5c7

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A39.202Z&_t=pubadsReady&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&uNw=1&uUq=1&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=%7B%22runtimeId%22%3A%2214uUcuaodMxMb%22%2C%22pageContext%22%3A%7B%22contentType%22%3A%22article%22%2C%22templateType%22%3A%22article%22%2C%22channel%22%3A%22information-technology%22%2C%22slug%22%3A%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%2C%22server%22%3A%22production%22%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%7D%2C%22version%22%3A%226.32.6%22%7D&_o=ars-technica&_c=ad_metrics&environment=prod&origin=ars-technica
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A39.209Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.32.6%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%222x2%22%2C%22slug%22%3A%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%7D&dim3=%7B%22footerStart%22%3A1585068458830%2C%22headerStart%22%3A1585068458813%2C%22navigationStart%22%3A1585068458338%2C%22injected%22%3A1585068459175%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22legacy%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.6%22%5D%2C%22ctx_page_slug%22%3A%5B%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%22waiting%22%5D%2C%22m_safety%22%3A%5B%22waiting%22%5D%2C%22m_categories%22%3A%5B%22waiting%22%5D%2C%22m_mv%22%3A%5B%22waiting%22%5D%2C%22m_gv%22%3A%5B%22waiting%22%5D%7D&environment=prod&origin=ars-technica
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A39.212Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.32.6%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%7D&dim3=%7B%22footerStart%22%3A1585068458830%2C%22headerStart%22%3A1585068458813%2C%22navigationStart%22%3A1585068458338%2C%22injected%22%3A1585068459178%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.6%22%5D%2C%22ctx_page_slug%22%3A%5B%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%22waiting%22%5D%2C%22m_safety%22%3A%5B%22waiting%22%5D%2C%22m_categories%22%3A%5B%22waiting%22%5D%2C%22m_mv%22%3A%5B%22waiting%22%5D%2C%22m_gv%22%3A%5B%22waiting%22%5D%7D&environment=prod&origin=ars-technica
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
bid
c.amazon-adsystem.com/e/dtb/
23 B
371 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pid=iAEiOB8zBDHrU&cb=0&ws=1600x1200&v=7.47.00&t=1000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22rail%2Fdesktop%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22hero%2Fdesktop%22%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%2C%22us_privacy%22%3A%221---%22%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.213.153 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-213-153.fra53.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
via
1.1 d01ad8df731d3f120823f9e20df55147.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA53-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
5v6lWkpFXg-1RAzrSXR1EixhhehJtHkshEyFwh_jq__ySS9XU5kdJA==
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1585068459028&de=875187791013&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=_out_of_page_0&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=2&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&ac=1&bq=11&f=0&zn=0&na=1387188341&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:39 GMT
collect
www.google-analytics.com/
35 B
105 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j81&a=160008911&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&dr=%2F&dp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&ul=en-us&de=UTF-8&dt=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aChAgUAjAAQC~&jid=97298754&gjid=848590031&cid=626944428.1585068459&tid=UA-31997-1&_gid=1583715159.1585068459&gtm=2wg3b2NLXNPCQ&cg1=article%7Creport&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=170&cd4=&cd6=Tue%20Mar%2024%202020%2017%3A47%3A38%20GMT%2B0100%20(Central%20European%20Standard%20Time)&cd7=1585068458919.57tuvnq&cd8=-1&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Dan%20Goodin&cd26=1662596&cd27=726&cd28=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cd29=web&cd32=2020-03-23T19%3A40%3A00%2B00%3A00&cd34=2020-03-24T16%3A44%3A27%2B00%3A00&cd35=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1662596&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&cd93=information%20technology&cd98=article%7Creport&cd103=&cd113=data-layer-loaded&cm21=1&cd3=626944428.1585068459&z=1546775486
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 23 Jan 2020 19:14:00 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
5261619
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j81&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&gjid=848590031&_gid=1583715159.1585068459&_u=aChAgUAjAAQC~&z=1405421001
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&_v=j81&z=1405421001
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&_v=j81&z=1405421001&slf_rd=1&random=1460726748
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&_v=j81&z=1405421001&slf_rd=1&random=1460726748
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=626944428.1585068459&jid=97298754&_v=j81&z=1405421001&slf_rd=1&random=1460726748
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame 8FF1
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe

Response headers

status
200
date
Tue, 24 Mar 2020 16:47:39 GMT
content-type
text/html; charset=utf-8
content-length
1291
set-cookie
__cfduid=d1b0a2712682544b3d2d62e76cf39393a1585068459; expires=Thu, 23-Apr-20 16:47:39 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly; SameSite=Lax
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
2025729233 2025716786
age
886
via
1.1 varnish
cf-cache-status
HIT
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5791e00e995dd6d9-FRA
b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/
2 KB
1 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8AC1) /
Resource Hash
0df18872a7d32620388cdc4df1e18acaa761a157830bbf8e258599352fa933fb

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
egjsK/D2d+BJxj1PL28vfg==
age
7245
x-cache
HIT
status
200
content-length
754
x-ms-lease-status
unlocked
last-modified
Tue, 10 Mar 2020 22:30:57 GMT
server
ECAcc (ama/8AC1)
etag
0x8D7C542B43D786A
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
d532792e-f01e-002e-55eb-015821000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 24 Mar 2020 20:47:39 GMT
otCCPAiab.js
cdn.cookielaw.org/opt-out/
22 KB
6 KB
Script
General
Full URL
https://cdn.cookielaw.org/opt-out/otCCPAiab.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8AEC) /
Resource Hash
10c75f7c6402ea3c15ba35494f299a73e62877fca5786e50f18983243fa16873

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
GLZFlYkrNGqcBQA787bV9Q==
age
7528
x-cache
HIT
status
200
content-length
5611
x-ms-lease-status
unlocked
last-modified
Wed, 18 Mar 2020 14:51:28 GMT
server
ECAcc (ama/8AEC)
etag
0x8D7CB4BD6F4A8BF
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
e14318e4-b01e-0000-4cea-01d8e6000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
expires
Tue, 24 Mar 2020 20:47:39 GMT
page
t.skimresources.com/api/v2/
22 B
342 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
link
t.skimresources.com/api/v2/
22 B
91 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1585068459303
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=44&t=1585068459028&de=875187791013&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=2&zMoatNadoDataLoadTime=264&zMoatAllDataLoadTime=264&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&ac=1&bq=11&f=0&zn=0&if=264&na=1543833033&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:39 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:39 GMT
dnsfeed
geolocation.1trust.app/cookieconsentpub/v1/geo/location/
198 B
548 B
Script
General
Full URL
https://geolocation.1trust.app/cookieconsentpub/v1/geo/location/dnsfeed
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/opt-out/otCCPAiab.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:da5d , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3feeda0e55d5d56340f75747469ba85f93d7e7e0c1f866b8cf67237991884b25
Security Headers
Name Value
Strict-Transport-Security max-age=2592000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=2592000; includeSubDomains; preload
content-type
text/javascript
status
200
cf-ray
5791e00f885764eb-FRA
vary
Accept-Encoding
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
200 B
519 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5ce739feda8de2994011ebf120933fd411e0ed2fffd8c0e3bb2ef860a039bdae
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
cf-ray
5791e00f39666401-FRA
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
54 KB
10 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-a9491fb9a9.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.220.246.137 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-220-246-137.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
069e870b6e87f44740da86df09060fc20ea42bf7517d33c5900e08b00e899599
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
9573
X-XSS-Protection
1; mode=block
X-Request-Id
ccf6fa6d-2b5a-491f-9479-c73dc1065d03
X-Runtime
0.002666
X-Backend-Node
10.110.77.166
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"ccad6879275fbc3ae706378167afc746"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
publishertag.js
static.criteo.net/js/ld/
96 KB
30 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:2638::3 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
d8435911753d7e931e1dda44b3ec12ce5158d6389131eadb584f0097a809c901

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
last-modified
Tue, 17 Mar 2020 08:42:53 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5e708d8d-18138"
content-type
text/javascript
status
200
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Wed, 25 Mar 2020 16:47:39 GMT
rid
match.adsrvr.org/track/
109 B
542 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.229.6.20 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-229-6-20.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
afa3e7bd9df42902fbd703aefc4159b20ee42b6e64ba174890436a29eee95628

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Thu, 23 Apr 2020 16:47:39 GMT
idsv2
mid.rkdms.com/
0
0
XHR
General
Full URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.65 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-201-65.fra53.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

otBannerSdk.js
cdn.cookielaw.org/scripttemplates/5.13.0/
389 KB
94 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.13.0/otBannerSdk.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8ACE) /
Resource Hash
759cbd9881e14214af52dfb585ccf70ea59037598b67cc9cf6df7d3fea7abfd0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
av5EYi/+VJcKyIBzruXtUw==
age
7539
x-cache
HIT
status
200
content-length
95775
x-ms-lease-status
unlocked
last-modified
Tue, 25 Feb 2020 19:24:49 GMT
server
ECAcc (ama/8ACE)
etag
0x8D7BA2861DF0E68
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
14daca0d-f01e-00a6-71ea-01e0f8000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 24 Mar 2020 20:47:39 GMT
5e5822b938d0690743f48b68.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady16316543
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5e5822b938d0690743f48b68.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady16316543
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-a9491fb9a9.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.40 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-40.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
543503d624bea2b1bf99cebc7728bf03a5a0d820f9db140a3dab3044c1f77632
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA6-C1
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
20742
X-XSS-Protection
1; mode=block
X-Request-Id
054f24aa-c0df-47ab-b3f1-f764c3492656
X-Runtime
0.007764
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"9a604f4b9a62b9435d2d961f4a909845"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 d3039ad83798b26ecb9f9f1e666afe27.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
oeepJvbQeBo1qih7IUXUrmh67DeYSnwU0sVEcHfZ8arSt0HIPccEJw==
arstechnica_war-stories-prince-of-persia.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1584454477/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1584454477/arstechnica_war-stories-prince-of-persia.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
56f8838a24cb0cc47dc34a19d6b84d6ce8bf8086b1682bbb990abc13b1e2da65
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff279c686ced6dbaee81ab03b4f89998.cloudfront.net (CloudFront)
Age
167
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:44:56 GMT
Server-Timing
fastly;dur=0;total=1;start=2020-03-19T16:33:20.944Z;desc=hit,rtt;dur=1
Content-Length
15682
Last-Modified
Wed, 18 Mar 2020 01:43:41 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"e9cccef2a4a4cf217be0ba162f6b4296"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
sufyRhH38ZwQzPKfXV_BDRopXmURT5xN2fnOO3s6BWBr0E0TMq88KQ==
arstechnica_war-stories-how-crash-bandicoot-hacked-the-playstation-to-run.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1582755533/
17 KB
18 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1582755533/arstechnica_war-stories-how-crash-bandicoot-hacked-the-playstation-to-run.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
46a9ddb1f206a46900872e0a832750ae06925528f81883a3d3517fdb42aefb6d
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
249
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:43:30 GMT
Server-Timing
cloudinary;dur=13;start=2020-02-27T18:16:50.360Z,fastly;dur=0;start=2020-03-06T17:41:18.103Z;desc=HIT,rtt;dur=5
Content-Length
17475
Last-Modified
Thu, 27 Feb 2020 18:16:40 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"7588b83c6eb2a1165344abad7e12e715"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
SJdt_F22-0494dDADEoZuGWF6CfZGif7Q_jMUaiV-k7Wzk1z9_S4AA==
arstechnica_war-stories-myst.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1580223113/
13 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1580223113/arstechnica_war-stories-myst.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
1bf55bc00dbf13180884211c3d301729e67b81f3456225c1fbf97d271d636509
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 36777c2dbd3e7df2effc3bbfbc9042cf.cloudfront.net (CloudFront)
Age
249
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:43:30 GMT
Server-Timing
cloudinary;dur=17;start=2020-01-29T20:33:40.375Z,fastly;dur=0;start=2020-03-12T12:50:02.756Z;desc=HIT,rtt;dur=1
Content-Length
13522
Last-Modified
Wed, 29 Jan 2020 20:33:36 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"ed8c6a9aa19e7d5c7aa46a3aead23a87"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
H9k-YmkLo0kZFXBFs8VNCEA0G-gbGBB1-VjBFx2Ti4GWTt9GcKe3ZA==
arstechnica_markiplier-reacts-to-his-top-1000-youtube-comments.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1579194313/
9 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1579194313/arstechnica_markiplier-reacts-to-his-top-1000-youtube-comments.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
e336ff50623cff960c2396944be4392139f63dcc032e5f3428d81489fdfe697a
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff279c686ced6dbaee81ab03b4f89998.cloudfront.net (CloudFront)
Age
249
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:43:30 GMT
Server-Timing
fastly;dur=0;start=2020-03-14T17:21:01.631Z;desc=HIT,rtt;dur=7
Content-Length
8832
Last-Modified
Tue, 21 Jan 2020 16:11:08 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"2bad386c14ac040d530ceb2ae89c8bbb"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
OaXfE8wcRSz7LtjMlkb4pw0VHDGOq8ukvhFHblThSw-YJBnad2dy7w==
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/
17 KB
18 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
5c57a0f6d257ca6be9e6bcb6039fea214962c35b7b30fee3dcc112b8cec18d59
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
192
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:44:44 GMT
Server-Timing
fastly;dur=0;start=2020-03-10T00:08:05.235Z;desc=HIT,rtt;dur=4
Content-Length
17267
Last-Modified
Thu, 12 Dec 2019 14:30:32 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"7cfa0c5590f779efc925bf7aee626a20"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
ohmrUIA9zVseMPEj2c0OlQVuefkNOew2RCunUUOfO9ZaZ_QObjKO5Q==
arstechnica_war-stories-war-stories-oddworld.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1582815531/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1582815531/arstechnica_war-stories-war-stories-oddworld.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
1097abb6f0992cccc79428374463e7f23b99dae5eb85d7317b20bd57c96031bb
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 36777c2dbd3e7df2effc3bbfbc9042cf.cloudfront.net (CloudFront)
Age
229
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:44:00 GMT
Server-Timing
cloudinary;dur=14;start=2020-02-27T15:06:31.167Z,fastly;dur=0;start=2020-03-10T02:10:38.704Z;desc=HIT,rtt;dur=5
Content-Length
12614
Last-Modified
Thu, 27 Feb 2020 15:06:28 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"4a7903cbe66890b5688d843661943ccd"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
bF2FRbVQr-uULK2R3ali1HNdTR0K6lxpY-_kC3fPbih8ECRBzzDBZw==
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/
11 KB
12 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
de24551bd4396fc8579b2d87ce01944553dd48fb52775d14373725a50efa0c37
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff279c686ced6dbaee81ab03b4f89998.cloudfront.net (CloudFront)
Age
249
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:43:30 GMT
Server-Timing
fastly;dur=0;start=2020-03-12T09:13:27.277Z;desc=HIT,rtt;dur=6
Content-Length
11417
Last-Modified
Fri, 08 Nov 2019 14:35:23 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"3e8509d06c6610d54babcac0d91e5d93"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
3tcrHVtVvb9bA5LcELa-Szqp8DY6PTdxa7agvFrJH5iyjxNG47Fx1Q==
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
LHR50-C1
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:47:39 GMT
Server-Timing
fastly;dur=0;start=2020-03-10T17:51:49.635Z;desc=HIT,rtt;dur=5
Content-Length
16236
Last-Modified
Mon, 23 Sep 2019 11:27:54 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"72002610618f7bf8bf0e52c760e39897"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
wUlU4_bSUNaHLJ62SSc9QXZiXrUnNaxIUYNqvP2EaGIBMo7OXwObXg==
arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/
11 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 10 Mar 2020 01:08:21 GMT
Via
1.1 36777c2dbd3e7df2effc3bbfbc9042cf.cloudfront.net (CloudFront)
Age
1265958
X-Cache
Hit from cloudfront
Server-Timing
cloudinary;dur=61;start=2020-03-10T00:29:09.767Z,fastly;dur=0;total=1;start=2020-03-10T01:08:21.229Z;desc=HIT,rtt;dur=5
Content-Length
10793
Last-Modified
Tue, 17 Sep 2019 19:55:15 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"0e1ff58ccf6d97759de3d774a7ff835a"
Strict-Transport-Security
max-age=604800
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
jMgoG-TngLMxcU2hY9yiZjZJ7Y2QyYnEE-zJGHkK3ebPrCOWJSiPqA==
arstechnica_warframe-reviews.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/arstechnica_warframe-reviews.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff279c686ced6dbaee81ab03b4f89998.cloudfront.net (CloudFront)
Age
249
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:43:31 GMT
Server-Timing
fastly;dur=0;start=2020-03-17T09:59:45.121Z;desc=HIT,rtt;dur=1
Content-Length
14837
Last-Modified
Thu, 27 Jun 2019 19:34:59 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"1d90d6aef7585f963e1270a1a02a4dd4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
kpwSDY1e1Tzyq96zPFCtGQWXneX8iEKxm6E2oYjYVABn8Mqe7nrxvQ==
arstechnica_war-stories-subnautica.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/arstechnica_war-stories-subnautica.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
LHR50-C1
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:47:39 GMT
Server-Timing
fastly;dur=0;start=2020-03-06T15:45:47.981Z;desc=HIT,rtt;dur=1
Content-Length
15222
Last-Modified
Wed, 05 Jun 2019 17:40:02 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"8c45b6c645caba59f4b14d3fbdc09062"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
R10I_1RlqYykP9H-DK8YuSOrz1nXwyXJhG8youP0yZEIZ7_LOWPXLA==
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 36777c2dbd3e7df2effc3bbfbc9042cf.cloudfront.net (CloudFront)
Age
289
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:42:50 GMT
Server-Timing
cloudinary;dur=261;start=2020-02-05T02:34:52.844Z,fastly;dur=0;start=2020-03-10T09:53:21.377Z;desc=HIT,rtt;dur=1
Content-Length
7863
Last-Modified
Mon, 13 May 2019 19:11:27 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
CujMVPitf0QPmMQWo4VS9hKAElwqQCvfZvQbRRnMmyrD9XLtfXHqPw==
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff279c686ced6dbaee81ab03b4f89998.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
LHR50-C1
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:47:39 GMT
Server-Timing
fastly;dur=0;start=2020-03-17T07:45:36.277Z;desc=HIT,rtt;dur=9
Content-Length
15634
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
EkND7L00AGYNzG9YeAR7l7fpCV4q9t8FeIVOziSfWIX3Bl8LPBdoNQ==
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
253
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:43:27 GMT
Server-Timing
fastly;dur=0;total=1;start=2020-03-14T20:52:52.736Z;desc=HIT,rtt;dur=1
Content-Length
15251
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
zrKsRSuwFOxUVR1Ao4UO6atkmYra-fPrSa-P9kzvYaUDOmVS_6z8dA==
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 36777c2dbd3e7df2effc3bbfbc9042cf.cloudfront.net (CloudFront)
Age
253
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:43:27 GMT
Server-Timing
fastly;dur=0;start=2020-03-14T16:41:27.124Z;desc=HIT,rtt;dur=1
Content-Length
19022
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
8QtVtM-sy8dN-8lKvq8ZrsAOX1dREfB2gjNXzQ-3fh5odBB6MxYU8A==
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
18 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff279c686ced6dbaee81ab03b4f89998.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
LHR50-C1
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:47:39 GMT
Server-Timing
fastly;dur=0;start=2020-03-06T19:57:16.891Z;desc=HIT,rtt;dur=5
Content-Length
18172
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
skBYA4XbAjTFlLTgVYDBZilkV2_SSoDuHvFaTBb0Eg_RSgC3FZNDiw==
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
315252
X-Cache
Hit from cloudfront
Date
Sat, 21 Mar 2020 01:17:12 GMT
Server-Timing
cloudinary;dur=69;start=2020-02-07T03:49:22.271Z,fastly;dur=0;total=1;start=2020-02-20T01:13:25.977Z;desc=HIT,rtt;dur=1
Content-Length
7393
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
LTREc-QR7e4BBdAbyY6skp0V09OarasPdIfl3ZnjA5IwhWybwvZUrw==
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 36777c2dbd3e7df2effc3bbfbc9042cf.cloudfront.net (CloudFront)
Age
114
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:45:45 GMT
Server-Timing
fastly;dur=0;start=2020-03-06T18:46:53.032Z;desc=HIT,rtt;dur=1
Content-Length
10595
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
inINhmGmzovwChoH0SbvHLyECsfAyGQ9vRUupADlhqy93otWb_YTxA==
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff279c686ced6dbaee81ab03b4f89998.cloudfront.net (CloudFront)
Age
114
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:45:45 GMT
Server-Timing
cloudinary;dur=68;start=2020-03-06T23:04:38.687Z,fastly;dur=0;start=2020-03-12T11:12:36.954Z;desc=HIT,rtt;dur=5
Content-Length
12509
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
NSmVKwqbOW3IOt-quT74qJSbmLLmfupM85HZwEbkdxjcu8N3a3JAPQ==
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
315622
X-Cache
Hit from cloudfront
Date
Sat, 21 Mar 2020 01:07:58 GMT
Server-Timing
cloudinary;dur=74;start=2020-02-12T00:13:15.118Z,fastly;dur=0;total=1;start=2020-02-20T01:07:03.594Z;desc=HIT,rtt;dur=1
Content-Length
7181
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
2SjTyam7jC4TPNz4t27gINE8EoDA3VSJmS_m2dmn3zZzymChtFU_Fw==
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 36777c2dbd3e7df2effc3bbfbc9042cf.cloudfront.net (CloudFront)
Age
289
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:42:50 GMT
Server-Timing
fastly;dur=0;total=1;start=2020-03-16T01:08:46.208Z;desc=HIT,rtt;dur=2
Content-Length
14040
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
P2fdiCniuFxFJgu9B0SV5XkVsm4mlfTQIlTMrhqMqhvnhonQFqHE2Q==
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
28
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:47:24 GMT
Server-Timing
fastly;dur=0;start=2020-03-06T15:41:28.907Z;desc=HIT,rtt;dur=4
Content-Length
13885
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
T6W6nyRWfDfEK-DBK6XUnXiSTijj0rX0MYvI9ZyTAlnYq7NM2OVQ3g==
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
Cookie set put.html
widgets.outbrain.com/nanoWidget/externals/cookie/ Frame DF9E
0
0
Document
General
Full URL
https://widgets.outbrain.com/nanoWidget/externals/cookie/put.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1585068458938
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.159 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-159.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/

Response headers

Accept-Ranges
bytes
Content-Type
text/html
ETag
"c0311cf15c21ddda054005e92fad3f9e:1584444137.095532"
Last-Modified
Tue, 17 Mar 2020 10:55:21 GMT
Server
AkamaiNetStorage
Content-Length
416
Cache-Control
max-age=604800
Date
Tue, 24 Mar 2020 16:47:39 GMT
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
Set-Cookie
akacd_widgets_routing=1585068459~rv=16~id=5c83ac2548dc48c09bf5aead69b6d17b; path=/; Expires=Tue, 24 Mar 2020 16:47:39 GMT; Secure; SameSite=None
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1585068458938
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=23319
Date
Tue, 24 Mar 2020 16:47:39 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Tue, 24 Mar 2020 23:16:18 GMT
en.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/
122 KB
18 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/en.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.13.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8B0C) /
Resource Hash
8379daabd87751a7da8f1ed0c4b558d62f7d19a01b72a7f50153c1ec95f4ac9a

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
oDldTv707db2pxAKcgGc8A==
age
7100
x-cache
HIT
status
200
content-length
18348
x-ms-lease-status
unlocked
last-modified
Tue, 10 Mar 2020 22:31:07 GMT
server
ECAcc (ama/8B0C)
etag
0x8D7C542BA1BB286
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
7b252941-f01e-0061-08eb-019c39000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 24 Mar 2020 20:47:39 GMT
ptrack-v1.4.1-dev.4-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
46 KB
18 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.4.1-dev.4-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.208.131 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-208-131.fra53.r.cloudfront.net
Software
nginx /
Resource Hash
6971adb7fc147ab4028012f8c0afa86bfad4101212c5881d1aab7c2fa6977b39

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 17 Feb 2020 23:03:52 GMT
Content-Encoding
gzip
Age
3087824
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Mon, 17 Feb 2020 22:55:27 GMT
Server
nginx
ETag
W/"5e4b19df-b7c7"
Content-Type
application/x-javascript
Via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
s36J7GRlMcSaebZt5_QkuCMPcc8VsG4hYLG38xm8-xPNME-7vwOUvQ==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
otCMP.js
cdn.cookielaw.org/scripttemplates/5.13.0/
16 KB
5 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.13.0/otCMP.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.13.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8B20) /
Resource Hash
fd9ee23548e148a3798e79ae0553689b81675afe6791f53d5e8af20973e6a7b0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
cgEQ1F8+NKFKe9J6MXvYfw==
age
7391
x-cache
HIT
status
200
content-length
5312
x-ms-lease-status
unlocked
last-modified
Tue, 25 Feb 2020 19:24:55 GMT
server
ECAcc (ama/8B20)
etag
0x8D7BA2865557BD9
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
6a5bb3ac-101e-0102-7fea-019c49000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
expires
Tue, 24 Mar 2020 20:47:39 GMT
iabData.json
cdn.cookielaw.org/vendorlist/
92 KB
17 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/vendorlist/iabData.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.13.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8AAF) /
Resource Hash
981898ccfc444d54beb452d380c685515410830fb12494784729fd1eaa68167f

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
kf/kUmh1gsah5KhM3yzvvw==
age
367544
x-cache
HIT
status
200
content-length
17115
x-ms-lease-status
unlocked
last-modified
Sat, 14 Mar 2020 06:00:11 GMT
server
ECAcc (ama/8AAF)
etag
0x8D7C7DCF4F45245
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
8df800d3-301e-0077-37a4-fe5da7000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=604800
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 24 Mar 2020 20:47:39 GMT
/
srv-2020-03-24-16.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2020-03-24-16.pixel.parsely.com/plogger/?rand=1585068459681&plid=6150165&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%2252ce58cf-fcaf-4e59-bd25-c7319e684480%22%2C%22parsely_site_uuid%22%3A%2252ce58cf-fcaf-4e59-bd25-c7319e684480%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&sref=&sts=1585068459679&slts=0&title=Windows+code-execution+zeroday+is+under+active+exploit%2C+Microsoft+warns+%7C+Ars+Technica&date=Tue+Mar+24+2020+17%3A47%3A39+GMT%2B0100+(Central+European+Standard+Time)&action=pageview&pvid=82555184&u=52ce58cf-fcaf-4e59-bd25-c7319e684480
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.232.138.226 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-232-138-226.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 16:47:40 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
otFlat.json
cdn.cookielaw.org/scripttemplates/5.13.0/assets/
15 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.13.0/assets/otFlat.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.13.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8AE7) /
Resource Hash
f52e4e999a441c151183d77efd6dad3915e650409ea65b94b7e0fc067dcd0abd

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
idLIfkDq/eva4EuRGVQzZQ==
age
7545
x-cache
HIT
status
200
content-length
2839
x-ms-lease-status
unlocked
last-modified
Tue, 25 Feb 2020 19:24:47 GMT
server
ECAcc (ama/8AE7)
etag
0x8D7BA28607C070E
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
a054722e-601e-0081-29ea-017ab1000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 24 Mar 2020 20:47:39 GMT
otPcCenter.json
cdn.cookielaw.org/scripttemplates/5.13.0/assets/
84 KB
17 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.13.0/assets/otPcCenter.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.13.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (ama/8B3B) /
Resource Hash
2bd6c30a523ce8b33d96dc79b1d759b5d5634740ae76aa6557e2d3741082e067

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
content-md5
Bbq+cqhXBxu2QqVrgDpPqg==
age
7538
x-cache
HIT
status
200
content-length
17012
x-ms-lease-status
unlocked
last-modified
Tue, 25 Feb 2020 19:24:47 GMT
server
ECAcc (ama/8B3B)
etag
0x8D7BA28609F260F
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
41845417-501e-0089-68ea-0161c2000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 24 Mar 2020 20:47:39 GMT
embed-api.json
player.cnevids.com/
7 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5e5822b938d0690743f48b68&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5e5822b938d0690743f48b68.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady16316543
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.40 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-40.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
2db34386505467cf0982cbdecdc8303c7b2ac8feee1519487168834d4536c60a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:40 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA6-C1
X-Cache
Miss from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2217
X-XSS-Protection
1; mode=block
X-Request-Id
2b20dc22-b30a-497a-a88c-17c5ad94a5ed
X-Runtime
0.010865
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"49be67d6673777ce2c9f11cdb9b40254"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 1b412557b82dda96e078541f9ee8dfb2.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
QoWKg9q3Zo4dYKQJ2ikc3BFchgGRGISq0O_ATTaCHp61nf7YE3dVUQ==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame DB5F
264 KB
90 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5e5822b938d0690743f48b68.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady16316543
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
fd9c4ff9e4c840fd5a0de9b08d276d0c6b21c7810dcc4c829365809082019a48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
91727
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:39 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
65 KB
24 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5e5822b938d0690743f48b68.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady16316543
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5840907b4c9bf2f9a2ff4a6ce7f4087fef8dcaf67c8e2b4ccabad6a3b50d18c9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:42:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 20 Mar 2020 23:14:12 GMT
server
sffe
age
290
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
24215
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:57:49 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame DB5F
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5e5822b938d0690743f48b68.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady16316543
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.113 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-254-113.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 09 Mar 2020 22:08:02 GMT
Content-Encoding
gzip
Age
1276778
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 a56d6b55603697d6c44b19d4f907baaa.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA6-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
R-7NO23l4SOJobSCvsrL2cO_ErKbomJJYk9Y96a7Y8QhSi2_vODuzw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-8acd27185b78ea8d8dde.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame DB5F
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5e5822b938d0690743f48b68.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady16316543
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.113 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-254-113.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5c6c066d45fcff5eb73d9f8c6e7b2d756d46229d4c05a7b776054c71c05c70b4

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Fri, 10 Jan 2020 11:16:17 GMT
Content-Encoding
gzip
Age
6413483
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234924
Last-Modified
Tue, 07 Jan 2020 21:03:27 GMT
Server
AmazonS3
ETag
"fb0b5702877a9be5aaeeec5b6ba4c842"
Content-Type
application/javascript
Via
1.1 a56d6b55603697d6c44b19d4f907baaa.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA6-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
CHsHrlu4ty2xq25_vN6b2KhwfBMYigKeZn5hbOd_YkjSVW_-8EIQqw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
user
4d.condenastdigital.com/
67 B
404 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=e5c9cc46-4fd7-4b14-8f66-79319457ca3f
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.23.50.9 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-23-50-9.compute-1.amazonaws.com
Software
/
Resource Hash
b60cce3696cc60ec30d62516841ed3632624195737d0f1f13d13c2597e29d56f

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:39 GMT
content-encoding
gzip
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
Content-Length
84
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
817 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db311174b0e3c340727b63c055cfb5b317808e909503e1bda11cc58af444f12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
325 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1585068459809&sessionId=274167a4-2b24-78a3-63a3-19a38824f4a6&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=1
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1585068458938
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN, US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:40 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
X-TraceId
933fcedb36223fd61721838179e44533
Content-Length
4
Expires
0
get
odb.outbrain.com/utils/
17 KB
10 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=1050169&apv=false&sig=oVCz3fvn&format=vjapi&va=true&rand=44956&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cnsnt=BOwxkC1OwxkC1AcABBENDBAAAAAuh7_______9______9uz_Ov_v_f__33e8__9v_l_7_-___u_-33d4u_1vf99yfm1-7etr3tp_87ues2_Xur__79__3z3_9pxP78k89r7337Ew_v-_v-b7BCPN_Y3lyA&cmpStat=1&ccpa=1---&ccpaStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1585068458938
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
f10e39fa8cc79b6b4944fedea20c77062cf68b5f08452dc93414e03d9f05690a
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
CHIDC2, MDW, HHN, Europe2
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
39cc5e20dd3598b8d225162a93366d41
content-length
9638
x-served-by
cache-mdw17343-MDW, cache-hhn4022-HHN
x-timer
S1585068460.206736,VS0,VE237
date
Tue, 24 Mar 2020 16:47:40 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
backend-ip
157.52.75.43
accept-ranges
bytes, bytes
x-cache-hits
0, 0
46abf1df-25b4-4a76-a59e-09eb469061fc
https://arstechnica.com/ Frame DB5F
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/46abf1df-25b4-4a76-a59e-09eb469061fc
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
worker

Response headers

Content-Length
31
Content-Type
application/javascript
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
325 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1585068459958&sessionId=274167a4-2b24-78a3-63a3-19a38824f4a6&url=arstechnica.com&cheqSource=1&cheqEvent=3&responseTime=351
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1585068458938
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN, US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:40 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
X-TraceId
7904048330f63e6f725e266c98d259cf
Content-Length
4
Expires
0
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A39.962Z&_t=pageview&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951&cEnt=windows%2C%20microsoft%2C%20page%20layout%2C%20zeroday%2C%20remote%20code-execution%2C%20adobe%20type%201%2C%20adobe%20system%2C%20dan%20goodin%2C%20hacker%2C%20adobe%20type%20manager%2C%20utc%2C%20postscript%2C%20malicious%20payload%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar%2C%20rename%20atmfd.dll&cEnw=1%2C%200.8315457476124544%2C%200.6427029821559366%2C%200.5023301028670565%2C%200.4796852697653377%2C%200.4716311197846365%2C%200.4453950850636448%2C%200.3990321160576756%2C%200.3937633118795625%2C%200.38793267905948103%2C%200.36993762162244276%2C%200.3671049223370393%2C%200.3518169887813935%2C%200.32435051078562427%2C%200.290503240766117%2C%200.24531746048684747%2C%200.23743691924222773%2C%200.23722376840188938%2C%200.23485826353871672%2C%200.23333092453202628&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&cPd=2020-03-23T19%3A40%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4400&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&_o=ars-technica&_c=general&xID=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&environment=prod&origin=ars-technica&cKh=windows%2Cmicrosoft%2Cvulnerability%2Cattacker%2Cpage%20layout
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.184.25 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-231-184-25.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Tue, 24 Mar 2020 16:47:40 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
l
mcdp-chidc2.outbrain.com/
4 B
376 B
XHR
General
Full URL
https://mcdp-chidc2.outbrain.com/l?token=bb5efd283c5c86edacb3b1718d2926c2_6817_1585068460385&tm=856&eT=0&tpcs=0&wRV=1050169&pVis=0&lsd=-1&eIdx=&cnsnt=BOwxkC1OwxkC1AcABBENDBAAAAAuh7_______9______9uz_Ov_v_f__33e8__9v_l_7_-___u_-33d4u_1vf99yfm1-7etr3tp_87ues2_Xur__79__3z3_9pxP78k89r7337Ew_v-_v-b7BCPN_Y3lyA&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1585068458938
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.31.142.63 Chicago, United States, ASN22075 (AS-OUTBRAIN, US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:41 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
fa5c8cf1b0b524eba46c64c922b61e4
Content-Length
30
Cookie set obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame EA70
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1585068458938
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.159 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-159.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
recs_5edbafdcd49d61da831080d405a351d5=0B1925901673A2640657707A2520912267A2695636444A2722630128A2668632062ACD1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/

Response headers

Accept-Ranges
bytes
Content-Type
text/html
ETag
"938505833703786e7ccfce1fecf1cd66:1582216491.628225"
Last-Modified
Thu, 20 Feb 2020 16:34:45 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Tue, 24 Mar 2020 16:47:40 GMT
Content-Length
3518
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
Set-Cookie
akacd_widgets_routing=1585068460~rv=40~id=cd7aa8c86384adfb2e203be1dd83b0c4; path=/; Expires=Tue, 24 Mar 2020 16:47:40 GMT; Secure; SameSite=None
eyJpdSI6ImQ5NzFhYTQwYTZkNDQxOWUwYWQyNzEyMmJhZmI5YjRjNGU5Y2ZmYWQ1MTJjYjlmNmE1NGE4ZmIwYjExZmIzMzkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
6 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ5NzFhYTQwYTZkNDQxOWUwYWQyNzEyMmJhZmI5YjRjNGU5Y2ZmYWQ1MTJjYjlmNmE1NGE4ZmIwYjExZmIzMzkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b1c2bea409cd185b9040d2d95362de03387cbe0db5b024cfa1d6cfe6affef7cc
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 05 Feb 2020 14:50:12 GMT
Date
Tue, 24 Mar 2020 16:47:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=3905
Connection
keep-alive
X-TraceId
b447e864e5897b5c2cdd7b5c7f233899
Timing-Allow-Origin
*
Content-Length
5730
eyJpdSI6IjM3ZmM3YzlmOWRkMzBiMjljN2M1MDdiZTU5MDc3ODc4NWVlOTk1MWYwMzkwYzBmYmJlYjU0OWM2NzFmY2Y1OTIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
10 KB
11 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjM3ZmM3YzlmOWRkMzBiMjljN2M1MDdiZTU5MDc3ODc4NWVlOTk1MWYwMzkwYzBmYmJlYjU0OWM2NzFmY2Y1OTIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1a5f445623dce05217874bba20f2882f2791597eb5184abaab8194edcc37f4e2
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 20 Feb 2020 18:43:51 GMT
Date
Tue, 24 Mar 2020 16:47:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1755956
Connection
keep-alive
X-TraceId
3488a54eb365886162cdee191c5f3851
Timing-Allow-Origin
*
Content-Length
10418
eyJpdSI6IjlhMTU3NTg3ZTYzMGUyYTcwZTA3ZTc4MDEwNGEyNWYwMjg5NzAxMmZkYmY4ZmE5OTQ4M2E1ZjYxNThhOGM0MTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
12 KB
12 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjlhMTU3NTg3ZTYzMGUyYTcwZTA3ZTc4MDEwNGEyNWYwMjg5NzAxMmZkYmY4ZmE5OTQ4M2E1ZjYxNThhOGM0MTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9037183e440ec34372ae4b70088a407638f53f1093325531bf7e93c6e2b5b539
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 20 Feb 2020 18:50:27 GMT
Date
Tue, 24 Mar 2020 16:47:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2034930
Connection
keep-alive
X-TraceId
3bd7da6252db4183f3ffd279591ae385
Timing-Allow-Origin
*
Content-Length
12066
eyJpdSI6ImJjOWYwMmM5NjE5YzI2MDZjMjhiN2IzMzYxMWY5ZDA2M2QxOGZjMjE0OTQ0YTNmZTZkNzA3YjcxMDViNzNmNGEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
10 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImJjOWYwMmM5NjE5YzI2MDZjMjhiN2IzMzYxMWY5ZDA2M2QxOGZjMjE0OTQ0YTNmZTZkNzA3YjcxMDViNzNmNGEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
16091c76ba1cac375d91721264d1bca29cef78534ee5b031e7e685b9da8178c1
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 27 Feb 2020 12:28:21 GMT
Date
Tue, 24 Mar 2020 16:47:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=674471
Connection
keep-alive
X-TraceId
fdf707e278c7c8d1ae63850a218b231e
Timing-Allow-Origin
*
Content-Length
9812
eyJpdSI6IjQ3Yjc3MTJkYjgyMTdlMGQ4ODQyODc4YWU2MTA5YThiMTA4YzY0NWE4NTNmMTU5MGI5MDQzYjZhYzI2MGE4MDAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
4 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjQ3Yjc3MTJkYjgyMTdlMGQ4ODQyODc4YWU2MTA5YThiMTA4YzY0NWE4NTNmMTU5MGI5MDQzYjZhYzI2MGE4MDAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7870a1a06070c833048053d1181225a67e4fba990c5910c27c98d265727cbfbf
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 17:49:40 GMT
Date
Tue, 24 Mar 2020 16:47:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2439792
Connection
keep-alive
X-TraceId
b15f963d8246d6efb82facfd208d686c
Timing-Allow-Origin
*
Content-Length
4120
eyJpdSI6IjJmN2U3ZmYzZTkxN2QyMDU1NWY3MTkyNjA1NDFkMjQxM2NiNDU2ZjVjMmY4MzRlMTRiMTZhODUzZmViODIwNjYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
8 KB
9 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjJmN2U3ZmYzZTkxN2QyMDU1NWY3MTkyNjA1NDFkMjQxM2NiNDU2ZjVjMmY4MzRlMTRiMTZhODUzZmViODIwNjYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b6a3b2c407485d9ea530621135f37d43293392241db4fd20eb34a0f7fb60b168
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 06 Mar 2020 08:07:03 GMT
Date
Tue, 24 Mar 2020 16:47:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=899827
Connection
keep-alive
X-TraceId
79784430896c01ebfb8d5d218861b631
Timing-Allow-Origin
*
Content-Length
8606
ads
securepubads.g.doubleclick.net/gampad/
11 KB
6 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2443323947283421&correlator=456661660470285&output=ldjh&impl=fifs&adsid=NT&eid=21065353&vrg=2020030501&us_privacy=1---&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200324&iu_parts=3379%2Cconde.ars%2Crail%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D0%26amznbid%3D2%26amznp%3D2%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.32.6%26ctx_page_slug%3Dattackers-exploit-windows-zeroday-that-can-execute-malicious-code%26cnt_tags%3Dexploits%252Cflaw%252Cmicrosoft-3%252Cvulnerabilities%252Cwindows%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3D%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26vnd_prx_segments%3D300003%252C121100%252C131100%252C131103%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cxm1ai0%252Cwmhp4i%252C0lw01o%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cimc5qw%252Cfdf1wd%252Cf5u35n%252C65f9pd%252Ccymbhor-t09&cookie=ID%3D0bae1e4a5d82669d%3AT%3D1585068459%3AS%3DALNI_MZj0ANXYzXLsixWxD0wq1p6LO3O_Q&cookie_enabled=1&bc=31&abxe=1&lmt=1585068460&dt=1585068460482&dlt=1585068458712&idt=188&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=370&adks=1483574547&ucis=3&ifi=3&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&dssz=48&icsg=563671507927040&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=626944428.1585068459&ga_sid=1585068459&ga_hid=160008911&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
4cabd4b0910dcf76624ea6098721d4f34473906211b1b6819378a95b172ec8e6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:40 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
6398
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
11 KB
6 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2443323947283421&correlator=456661660470285&output=ldjh&impl=fifs&adsid=NT&eid=21065353&vrg=2020030501&us_privacy=1---&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200324&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C9x1%7C10x1&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D0%26amznbid%3D2%26amznp%3D2%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0&eri=1&cust_params=env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.32.6%26ctx_page_slug%3Dattackers-exploit-windows-zeroday-that-can-execute-malicious-code%26cnt_tags%3Dexploits%252Cflaw%252Cmicrosoft-3%252Cvulnerabilities%252Cwindows%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3D%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26vnd_prx_segments%3D300003%252C121100%252C131100%252C131103%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cxm1ai0%252Cwmhp4i%252C0lw01o%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cimc5qw%252Cfdf1wd%252Cf5u35n%252C65f9pd%252Ccymbhor-t09&cookie=ID%3D0bae1e4a5d82669d%3AT%3D1585068459%3AS%3DALNI_MZj0ANXYzXLsixWxD0wq1p6LO3O_Q&cookie_enabled=1&bc=31&abxe=1&lmt=1585068460&dt=1585068460489&dlt=1585068458712&idt=188&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=80&adks=2385402828&ucis=4&ifi=4&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&dssz=48&icsg=563671507927040&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90&msz=1585x90&ga_vid=626944428.1585068459&ga_sid=1585068459&ga_hid=160008911&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
03b3ff04a010011ca4a41315f0a150bb85c6c4dc710aa2ada08aceee35b4d260
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:40 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
6537
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame A751
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 24 Mar 2020 15:59:23 GMT
expires
Wed, 24 Mar 2021 15:59:23 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
2897
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:40 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&m=0&ar=29bb202-clean&iw=81ef8f7&q=1&cb=0&cu=1585068459028&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=1778084817&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:40 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A40.714Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951&cEnt=windows%2C%20microsoft%2C%20page%20layout%2C%20zeroday%2C%20remote%20code-execution%2C%20adobe%20type%201%2C%20adobe%20system%2C%20dan%20goodin%2C%20hacker%2C%20adobe%20type%20manager%2C%20utc%2C%20postscript%2C%20malicious%20payload%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar%2C%20rename%20atmfd.dll&cEnw=1%2C%200.8315457476124544%2C%200.6427029821559366%2C%200.5023301028670565%2C%200.4796852697653377%2C%200.4716311197846365%2C%200.4453950850636448%2C%200.3990321160576756%2C%200.3937633118795625%2C%200.38793267905948103%2C%200.36993762162244276%2C%200.3671049223370393%2C%200.3518169887813935%2C%200.32435051078562427%2C%200.290503240766117%2C%200.24531746048684747%2C%200.23743691924222773%2C%200.23722376840188938%2C%200.23485826353871672%2C%200.23333092453202628&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&cPd=2020-03-23T19%3A40%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.32.6%22%7D&_o=ars-technica&_c=cns_ads&xID=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%7D&dim3=%7B%22footerStart%22%3A1585068458830%2C%22headerStart%22%3A1585068458813%2C%22navigationStart%22%3A1585068458338%2C%22injected%22%3A1585068460714%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.6%22%5D%2C%22ctx_page_slug%22%3A%5B%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22xm1ai0%22%2C%22wmhp4i%22%2C%220lw01o%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22imc5qw%22%2C%22fdf1wd%22%2C%22f5u35n%22%2C%2265f9pd%22%2C%22cymbhor-t09%22%5D%7D&environment=prod&origin=ars-technica&cKh=windows%2Cmicrosoft%2Cvulnerability%2Cattacker%2Cpage%20layout
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1585068459028&de=875187791013&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=siderail_0&zMoatRendered=3&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=1&zMoatPageDataTargetingSet=3&zMoatSafetyTargetingSet=3&zMoatEmptySlot=2&zMoatNadoDataLoadTime=264&zMoatAllDataLoadTime=264&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&ac=1&bq=11&f=0&zn=0&if=264&na=1620951725&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:40 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 9C35
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Tue, 24 Mar 2020 15:59:23 GMT
expires
Wed, 24 Mar 2021 15:59:23 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
2897
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1585068459028&de=501553923761&rx=933618523988&m=0&ar=29bb202-clean&iw=81ef8f7&q=2&cb=0&cu=1585068459028&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=1114705799&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:40 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A40.861Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951&cEnt=windows%2C%20microsoft%2C%20page%20layout%2C%20zeroday%2C%20remote%20code-execution%2C%20adobe%20type%201%2C%20adobe%20system%2C%20dan%20goodin%2C%20hacker%2C%20adobe%20type%20manager%2C%20utc%2C%20postscript%2C%20malicious%20payload%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar%2C%20rename%20atmfd.dll&cEnw=1%2C%200.8315457476124544%2C%200.6427029821559366%2C%200.5023301028670565%2C%200.4796852697653377%2C%200.4716311197846365%2C%200.4453950850636448%2C%200.3990321160576756%2C%200.3937633118795625%2C%200.38793267905948103%2C%200.36993762162244276%2C%200.3671049223370393%2C%200.3518169887813935%2C%200.32435051078562427%2C%200.290503240766117%2C%200.24531746048684747%2C%200.23743691924222773%2C%200.23722376840188938%2C%200.23485826353871672%2C%200.23333092453202628&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&cPd=2020-03-23T19%3A40%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.32.6%22%7D&_o=ars-technica&_c=cns_ads&xID=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%7D&dim3=%7B%22footerStart%22%3A1585068458830%2C%22headerStart%22%3A1585068458813%2C%22navigationStart%22%3A1585068458338%2C%22injected%22%3A1585068460861%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.6%22%5D%2C%22ctx_page_slug%22%3A%5B%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22xm1ai0%22%2C%22wmhp4i%22%2C%220lw01o%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22imc5qw%22%2C%22fdf1wd%22%2C%22f5u35n%22%2C%2265f9pd%22%2C%22cymbhor-t09%22%5D%7D&environment=prod&origin=ars-technica&cKh=windows%2Cmicrosoft%2Cvulnerability%2Cattacker%2Cpage%20layout
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1585068459028&de=875187791013&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=post_nav_0&zMoatRendered=4&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=2&zMoatPageDataTargetingSet=4&zMoatSafetyTargetingSet=4&zMoatEmptySlot=2&zMoatNadoDataLoadTime=264&zMoatAllDataLoadTime=264&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&ac=1&bq=11&f=0&zn=0&if=264&na=1049871994&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:40 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:40 GMT
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame DB5F
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.113 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-254-113.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:47:42 GMT
Content-Encoding
gzip
X-Amz-Cf-Pop
FRA6-C1
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
WQAjv-KHOsEMhsTchsiZLys0el7VePtp7_c4usIkTNEY812F03Mvdg==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.376.3_en.html
imasdk.googleapis.com/js/core/ Frame F1B7
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.376.3_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.376.3_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196758
date
Tue, 24 Mar 2020 09:47:04 GMT
expires
Wed, 24 Mar 2021 09:47:04 GMT
last-modified
Fri, 20 Mar 2020 23:10:57 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
25236
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame DB5F
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:41 GMT
integrator.js
adservice.google.com/adsid/ Frame DB5F
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame DB5F
126 KB
30 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
5a91c6d3e635c0bd1551a53cf0769328132151a7732039170280d500dbcb4685
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
30466
x-xss-protection
0
pragma
public
x-fb-debug
Nc2YGUh3EOGw86U6J3UbdL+0vbrZZOZyvkqFaBGRRPG2aJYf5tM7wgBlvpL+n6zHILWGJomcQyehJf0jZInaTA==
x-fb-trip-id
420120009
date
Tue, 24 Mar 2020 16:47:41 GMT, Tue, 24 Mar 2020 16:47:41 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame DB5F
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.113 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-254-113.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 16:47:01 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
41
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 a56d6b55603697d6c44b19d4f907baaa.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA6-C1
Connection
keep-alive
X-Amz-Cf-Id
cvbt9NkK_NOX0tGKfxYwOfDJLpIeUSlt595dqrnrztqDO9j0BqXBnQ==
collect
www.google-analytics.com/r/
35 B
127 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:41 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame DB5F
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-03-24T16%3A47%3A40.926Z&_c=&_t=Player%20Requested&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_war-stories-prince-of-persia.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1584454477/ Frame DB5F
70 KB
71 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1584454477/arstechnica_war-stories-prince-of-persia.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
ea4101dd4137f8a8eee9a6f243d17a5cde9db3ea3013a4e16c34418de335a552
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
137
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:45:59 GMT
Server-Timing
fastly;dur=0;total=1;start=2020-03-18T22:47:43.283Z;desc=hit,rtt;dur=22
Content-Length
72134
Last-Modified
Tue, 17 Mar 2020 15:14:52 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"6edb7af6cfacb59c1bd9fb8e267a7712"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
qb4SEAEggIxkCvGgr6PEnUdk0hxb1wKv91t0bpPBva9niS5lwkntzA==
f5e876af-cedc-4721-a22b-6aa34c36e925thumbs.mp4
dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/ Frame DB5F
16 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/f5e876af-cedc-4721-a22b-6aa34c36e925thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.121 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-201-121.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Sec-Fetch-Dest
video
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Mon, 23 Mar 2020 19:29:09 GMT
Via
1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
Last-Modified
Thu, 27 Feb 2020 20:30:21 GMT
Server
AmazonS3
Age
76713
ETag
"aa156369293534f8e2d2b04a52fa5623"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-3737313/3737314
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
Content-Length
3737314
X-Amz-Cf-Id
1m0da1ft7p_dPrJVNBwjCAe5_OpBH6_MEdk2Df3FKTisgMPho6A-gA==
f5e876af-cedc-4721-a22b-6aa34c36e925thumbs.mp4
dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/ Frame DB5F
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/f5e876af-cedc-4721-a22b-6aa34c36e925thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.121 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-201-121.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Sec-Fetch-Dest
video
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Mon, 23 Mar 2020 19:29:09 GMT
Via
1.1 4809763494a078a525dc1a2dff5ddf6c.cloudfront.net (CloudFront)
Last-Modified
Thu, 27 Feb 2020 20:30:21 GMT
Server
AmazonS3
Age
76713
ETag
"aa156369293534f8e2d2b04a52fa5623"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-3737313/3737314
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
Content-Length
3737314
X-Amz-Cf-Id
16nk83UnYu0CWWG8aAdnAzr7V9_0jOFONtyum7VQ0R3vA5RVEwmorA==
track
capture.condenastdigital.com/ Frame DB5F
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-03-24T16%3A47%3A41.113Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fwww.arstechnica.com%2Fvideo%2Fwatch%2Fwar-stories-how-prince-of-persia-defeated-apple-ii-s-memory-limitations&cId=5e5822b938d0690743f48b68&cKe=video%20games%2Cprince%20of%20persia%2Cprince%20of%20persia%20apple%20ii%2Capple%20ii%20games%2Cars%20technica%20war%20stories%2Cclassic%20video%20games%2Cretro%20gaming%2Crotoscope%2Crotoscoping%2Crotoscope%20animation%2Cinterview%2Cgame%20development%2Cvideo%20game%20development%2Cgame%20developer%2Cvideo%20game%20developer&cPd=2020-03-17T15%3A00%3A00%2B00%3A00&cTi=How%20Prince%20of%20Persia%20Defeated%20Apple%20II%27s%20Memory%20Limitations&mDu=1248&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&pWw=540&pWh=303.75&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&uId=45cc024e-2e4a-4cf1-8edd-42838682f3a3&xid=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%227a2672b%22%2C%22guid%22%3A%22b7393d9f-34e1-72fe-ac29-45cc470d866%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3109.1875%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ee39d0fa-ed52-49c9-bd8f-a1fcedd32ce1
https://arstechnica.com/ Frame DB5F
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/ee39d0fa-ed52-49c9-bd8f-a1fcedd32ce1
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
worker

Response headers

Content-Length
5463
Content-Type
application/javascript
f5e876af-cedc-4721-a22b-6aa34c36e925manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/ Frame DB5F
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/f5e876af-cedc-4721-a22b-6aa34c36e925manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.121 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-201-121.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
50f762386cb9f2b1f96aa93356b1e3d7a5063bc1bd5a4bc62d849fc52a971b07

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:20:00 GMT
Via
1.1 4809763494a078a525dc1a2dff5ddf6c.cloudfront.net (CloudFront)
Vary
Origin
Age
1662
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Thu, 27 Feb 2020 20:27:03 GMT
Server
AmazonS3
ETag
"a1a39c6e4bf3cfaede68b313469202bb"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
mxdX-o_QSeMil7OdPLName0mZAO08RhjXcOJThKU8zHgcJQstb_O7Q==
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020030501&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
470cb598c64c0dc1fc9d8b28ca3f58de7f6d5b6e35f37bc01a26c0b72ce85903
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 16:47:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5167
x-xss-protection
0
1663130473914833
connect.facebook.net/signals/config/ Frame DB5F
448 KB
113 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.15&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
843759a1000773976898343a8587017d0ba04f5d7f4fdd76012a5b7be990e4ff
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
115470
x-xss-protection
0
pragma
public
x-fb-debug
/pATkHpYGTefhA2OA8J9drCQg1pkbZFE7uLhkcdkSOh+49JWJO/CTSbIgmbtaL2MDC1L+1aEXWa9/FN6/ud5/w==
x-fb-trip-id
420120009
date
Tue, 24 Mar 2020 16:47:41 GMT, Tue, 24 Mar 2020 16:47:41 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
collect
www.google-analytics.com/
35 B
107 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j81&a=160008911&t=event&ni=1&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&dr=%2F&dp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&ul=en-us&de=UTF-8&dt=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=scroll%20tracking&ea=vertical%20scroll%20tracking&el=scroll%3A%2025&_u=aCjAAUAjAAQC~&jid=&gjid=&cid=626944428.1585068459&tid=UA-31997-1&_gid=1583715159.1585068459&gtm=2wg3b2NLXNPCQ&cg1=article%7Creport&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=170&cd4=&cd6=Tue%20Mar%2024%202020%2017%3A47%3A41%20GMT%2B0100%20(Central%20European%20Standard%20Time)&cd7=1585068461146.1jty0zq4&cd8=-1&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=GA%20-%20Event%20-%20Vertical%20Scroll%20Tracking&cd20=none&cd21=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&cd24=1&cd25=Dan%20Goodin&cd26=1662596&cd27=726&cd28=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cd29=web&cd32=2020-03-23T19%3A40%3A00%2B00%3A00&cd34=2020-03-24T16%3A44%3A27%2B00%3A00&cd35=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1662596&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&cd93=information%20technology&cd98=article%7Creport&cd103=&cd113=gtm.scrollDepth&cd3=626944428.1585068459&z=985929358
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 23 Jan 2020 19:14:00 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
5261621
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
arstechnica_war-stories-prince-of-persia.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1584454477/ Frame DB5F
70 KB
71 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1584454477/arstechnica_war-stories-prince-of-persia.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
ea4101dd4137f8a8eee9a6f243d17a5cde9db3ea3013a4e16c34418de335a552
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
image
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
Age
137
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:45:59 GMT
Server-Timing
fastly;dur=0;total=1;start=2020-03-18T22:47:43.283Z;desc=hit,rtt;dur=22
Content-Length
72134
Last-Modified
Tue, 17 Mar 2020 15:14:52 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"6edb7af6cfacb59c1bd9fb8e267a7712"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
X-Amz-Cf-Pop
LHR50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
BaXH1wmRl1coGBVde6JJ0DR8aoeax9hGiJ-wihMMcfO4_XigsYQUDw==
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Tue, 24 Mar 2020 16:47:41 GMT
arstechnica_war-stories-prince-of-persia.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1584454477/ Frame DB5F
70 KB
71 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1584454477/arstechnica_war-stories-prince-of-persia.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.179.185 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-179-185.lhr50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
ea4101dd4137f8a8eee9a6f243d17a5cde9db3ea3013a4e16c34418de335a552
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 4278118a12a0d89e17a517194fb2e732.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
LHR50-C1
X-Cache
Hit from cloudfront
Date
Tue, 24 Mar 2020 16:47:41 GMT
Server-Timing
fastly;dur=0;total=1;start=2020-03-18T22:47:43.283Z;desc=hit,rtt;dur=22
Content-Length
72134
Last-Modified
Tue, 17 Mar 2020 15:14:52 GMT
Server
Cloudinary
Connection
keep-alive
ETag
"6edb7af6cfacb59c1bd9fb8e267a7712"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Content-Disposition,Server-Timing
Cache-Control
public, no-transform, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
xu_vTldTHgsvP_Idh3FPvmaHjm95TRgxsTLZZ9IBH9dqro-v43-TTw==
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 69E3
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 24 Mar 2020 15:59:46 GMT
expires
Wed, 24 Mar 2021 15:59:46 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2875
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&cu=1585068459028&m=2208&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=53&an=0&gf=53&gg=0&ix=53&ic=53&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=53&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=106&cd=0&ah=106&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=233174211&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:41 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:41 GMT
f5e876af-cedc-4721-a22b-6aa34c36e925file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/ Frame DB5F
17 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/f5e876af-cedc-4721-a22b-6aa34c36e925file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.121 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-201-121.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
cf0bd1da56c1ce18f78560b5bf4fb33dbc214a4254d25c42b92b21cca2f1380d

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:18:11 GMT
Content-Encoding
gzip
Vary
Origin
Age
1771
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Thu, 27 Feb 2020 20:36:32 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 4809763494a078a525dc1a2dff5ddf6c.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA53-C1
X-Amz-Cf-Id
9MehqUpJYQZQNJI0Qb1Nr5deEIO_EO9jjeMCjVPAWGBcEqr2rvME-g==
ce719fd6-104b-4a2c-8ecb-747c0a97b5c2
https://arstechnica.com/ Frame DB5F
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/ce719fd6-104b-4a2c-8ecb-747c0a97b5c2
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
worker

Response headers

Content-Length
65790
Content-Type
application/javascript
f5e876af-cedc-4721-a22b-6aa34c36e925file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/ Frame DB5F
349 KB
350 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5e5822b938d0690743f48b68/f5e876af-cedc-4721-a22b-6aa34c36e925file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.121 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-201-121.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c113d157ed4ce3b4f80767998fba3f8dc9900f3945f619329afe5e386f02660

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 16:18:11 GMT
Via
1.1 4809763494a078a525dc1a2dff5ddf6c.cloudfront.net (CloudFront)
Vary
Origin
Age
1770
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
357388
Last-Modified
Thu, 27 Feb 2020 20:36:22 GMT
Server
AmazonS3
ETag
"c6eb16922eeb4f4b6962c79aff48435b"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
ksmTcNoUtwpu2CWfbjQe9pcrZ1slaLy6kYfuO1kAIR1z6ibY0OBZNQ==
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020030501&jk=2443323947283421&bg=!W1ilWEBYlk43JNYuLRICAAAATVIAAAAPmQFbMaIrl9wEQ0yGbdsREZpfFTCFiww-IETuHnkuFpqr0Iu0CqnOkVadReBnFi1opp06ytQPiIJ5Lc8j23E84Q7ZAXL5YgQNxwNm88Vb-s0hoPyp6tzyeiBIwoT1cMRr7O12wEkt08-Eq241WgIFI7uLjNo_dq9ABmxrfpNg0-B4DY6s4oUwhr3BqIaRY8foSmxSpRV_1fzrcddXFFQsdvyMS332mHecnCrucYtDFxXlBsie59acOk9Rm8tN0K4_LTl-ayCHke5NaVCOL93_PfPfzZBx9ORsgqGMQaa9oehPLpivqOjBlYetMEFDxzGw6L6xoWUIfnNWjTFetu3oHlE_XXlvKMDKj-Lkf0FvmvsqKTevheJKP-xN2j5_dSqonm3KJHzK7XkFOkRNdmc6umt3iSdPLwHO0ZyHLiia0CF9ktis20to6eGYpASsueVmIxdcvLGLhCumBhe69Mo
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:41 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=501553923761&rx=933618523988&cu=1585068459028&m=2349&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=27&an=0&gf=27&gg=0&ix=27&ic=27&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=27&bx=0&dj=1&im=0&in=0&pd=0&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=53&cd=0&ah=53&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1699690837&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:41 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:41 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A41.922Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951&cEnt=windows%2C%20microsoft%2C%20page%20layout%2C%20zeroday%2C%20remote%20code-execution%2C%20adobe%20type%201%2C%20adobe%20system%2C%20dan%20goodin%2C%20hacker%2C%20adobe%20type%20manager%2C%20utc%2C%20postscript%2C%20malicious%20payload%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar%2C%20rename%20atmfd.dll&cEnw=1%2C%200.8315457476124544%2C%200.6427029821559366%2C%200.5023301028670565%2C%200.4796852697653377%2C%200.4716311197846365%2C%200.4453950850636448%2C%200.3990321160576756%2C%200.3937633118795625%2C%200.38793267905948103%2C%200.36993762162244276%2C%200.3671049223370393%2C%200.3518169887813935%2C%200.32435051078562427%2C%200.290503240766117%2C%200.24531746048684747%2C%200.23743691924222773%2C%200.23722376840188938%2C%200.23485826353871672%2C%200.23333092453202628&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&cPd=2020-03-23T19%3A40%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.32.6%22%7D&_o=ars-technica&_c=cns_ads&xID=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%7D&dim3=%7B%22footerStart%22%3A1585068458830%2C%22headerStart%22%3A1585068458813%2C%22navigationStart%22%3A1585068458338%2C%22injected%22%3A1585068460714%2C%22viewable%22%3A1585068461922%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1585068460897%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.6%22%5D%2C%22ctx_page_slug%22%3A%5B%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22xm1ai0%22%2C%22wmhp4i%22%2C%220lw01o%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22imc5qw%22%2C%22fdf1wd%22%2C%22f5u35n%22%2C%2265f9pd%22%2C%22cymbhor-t09%22%5D%7D&environment=prod&origin=ars-technica&cKh=windows%2Cmicrosoft%2Cvulnerability%2Cattacker%2Cpage%20layout
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A41.926Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951&cEnt=windows%2C%20microsoft%2C%20page%20layout%2C%20zeroday%2C%20remote%20code-execution%2C%20adobe%20type%201%2C%20adobe%20system%2C%20dan%20goodin%2C%20hacker%2C%20adobe%20type%20manager%2C%20utc%2C%20postscript%2C%20malicious%20payload%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar%2C%20rename%20atmfd.dll&cEnw=1%2C%200.8315457476124544%2C%200.6427029821559366%2C%200.5023301028670565%2C%200.4796852697653377%2C%200.4716311197846365%2C%200.4453950850636448%2C%200.3990321160576756%2C%200.3937633118795625%2C%200.38793267905948103%2C%200.36993762162244276%2C%200.3671049223370393%2C%200.3518169887813935%2C%200.32435051078562427%2C%200.290503240766117%2C%200.24531746048684747%2C%200.23743691924222773%2C%200.23722376840188938%2C%200.23485826353871672%2C%200.23333092453202628&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&cPd=2020-03-23T19%3A40%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.32.6%22%7D&_o=ars-technica&_c=cns_ads&xID=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%7D&dim3=%7B%22footerStart%22%3A1585068458830%2C%22headerStart%22%3A1585068458813%2C%22navigationStart%22%3A1585068458338%2C%22injected%22%3A1585068460861%2C%22viewable%22%3A1585068461926%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1585068461099%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.6%22%5D%2C%22ctx_page_slug%22%3A%5B%22attackers-exploit-windows-zeroday-that-can-execute-malicious-code%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22flaw%22%2C%22microsoft-3%22%2C%22vulnerabilities%22%2C%22windows%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22121100%22%2C%22131100%22%2C%22131103%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22xm1ai0%22%2C%22wmhp4i%22%2C%220lw01o%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22imc5qw%22%2C%22fdf1wd%22%2C%22f5u35n%22%2C%2265f9pd%22%2C%22cymbhor-t09%22%5D%7D&environment=prod&origin=ars-technica&cKh=windows%2Cmicrosoft%2Cvulnerability%2Cattacker%2Cpage%20layout
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:41 GMT
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&cu=1585068459028&m=3308&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1159&an=53&gi=1&gf=1159&gg=53&ix=1159&ic=1159&ez=1&ck=1159&kw=1011&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1159&bx=53&ci=1159&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1011&cd=106&ah=1011&am=106&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=658940945&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:42 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:42 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&cu=1585068459028&m=3309&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1159&an=1159&gi=1&gf=1159&gg=1159&ix=1159&ic=1159&ez=1&ck=1159&kw=1011&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1159&bx=1159&ci=1159&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1011&cd=1011&ah=1011&am=1011&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=144673688&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:42 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:42 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&cu=1585068459028&m=3310&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1159&an=1159&gi=1&gf=1159&gg=1159&ix=1159&ic=1159&ez=1&ck=1159&kw=1011&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1159&bx=1159&ci=1159&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1011&cd=1011&ah=1011&am=1011&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=847382387&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:42 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:42 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=501553923761&rx=933618523988&cu=1585068459028&m=3512&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1190&an=27&gi=1&gf=1190&gg=27&ix=1190&ic=1190&ez=1&ck=1190&kw=1012&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1190&bx=27&ci=1190&jz=1012&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1012&cd=53&ah=1012&am=53&rf=0&re=0&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=907237038&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:42 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:42 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=501553923761&rx=933618523988&cu=1585068459028&m=3513&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1190&an=1190&gi=1&gf=1190&gg=1190&ix=1190&ic=1190&ez=1&ck=1190&kw=1012&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1190&bx=1190&ci=1190&jz=1012&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1012&cd=1012&ah=1012&am=1012&rf=0&re=0&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1981208829&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:42 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:42 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=501553923761&rx=933618523988&cu=1585068459028&m=3514&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1190&an=1190&gi=1&gf=1190&gg=1190&ix=1190&ic=1190&ez=1&ck=1190&kw=1012&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1190&bx=1190&ci=1190&jz=1012&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1012&cd=1012&ah=1012&am=1012&rf=0&re=0&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1274386365&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:42 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:42 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.184.25 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-231-184-25.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Tue, 24 Mar 2020 16:47:42 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
ads
pubads.g.doubleclick.net/gampad/ Frame DB5F
6 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.32.6%26ctx_page_slug%3Dattackers-exploit-windows-zeroday-that-can-execute-malicious-code%26cnt_tags%3Dexploits%252Cflaw%252Cmicrosoft-3%252Cvulnerabilities%252Cwindows%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3D%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26vnd_prx_segments%3D300003%252C121100%252C131100%252C131103%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cxm1ai0%252Cwmhp4i%252C0lw01o%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cimc5qw%252Cfdf1wd%252Cf5u35n%252C65f9pd%252Ccymbhor-t09%26ctx_line_items%3D%26height%3D304%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26series%3D5c82bd18bcdfff6f1f2fc5e7%26width%3D540&correlator=456661660470285&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fwar-stories-how-prince-of-persia-defeated-apple-ii-s-memory-limitations&vid=5e5822b938d0690743f48b68&cmsid=1495&ppid=e5c9cc464fd74b148f6679319457ca3f
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
14b9e3a004402adc96fbae42380477705a1af3607322dac742692fbc7b438413
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 16:47:44 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1181
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame DB5F
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-03-24T16%3A47%3A43.996Z&_c=timedOut&_t=gptData&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fconde.ars%2Fmid-content%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225e5822b938d0690743f48b68%22%7D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:44 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/
35 B
111 B
Other
General
Full URL
https://www.google-analytics.com/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:44 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame DB5F
295 KB
99 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
eb3a4648bbf1eebdfefd7e8716059f1bd319dd2e3dcff586692b7cca4500e8e0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:47:44 GMT
content-encoding
gzip
last-modified
Thu, 20 Feb 2020 16:26:33 GMT
server
AmazonS3
x-amz-request-id
BF9E79EB036EF581
etag
"4477f89d074c0a31b948cf7467bd06e3"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=23996
accept-ranges
bytes
content-length
100581
x-amz-id-2
GFjEB+HtUAfGSRr5s69bds6lqZfTydPM4J4AVtKmwf6w+hUa3fFeniiYfAz+coUJwhPGzQGF+f8=
track
capture.condenastdigital.com/ Frame DB5F
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-03-24T16%3A47%3A44.141Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fwww.arstechnica.com%2Fvideo%2Fwatch%2Fwar-stories-how-prince-of-persia-defeated-apple-ii-s-memory-limitations&cId=5e5822b938d0690743f48b68&cKe=video%20games%2Cprince%20of%20persia%2Cprince%20of%20persia%20apple%20ii%2Capple%20ii%20games%2Cars%20technica%20war%20stories%2Cclassic%20video%20games%2Cretro%20gaming%2Crotoscope%2Crotoscoping%2Crotoscope%20animation%2Cinterview%2Cgame%20development%2Cvideo%20game%20development%2Cgame%20developer%2Cvideo%20game%20developer&cPd=2020-03-17T15%3A00%3A00%2B00%3A00&cTi=How%20Prince%20of%20Persia%20Defeated%20Apple%20II%27s%20Memory%20Limitations&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=1248&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&pWw=540&pWh=303.75&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&uId=45cc024e-2e4a-4cf1-8edd-42838682f3a3&xid=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%227a2672b%22%2C%22guid%22%3A%22b7393d9f-34e1-72fe-ac29-45cc470d866%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3109.1875%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Creport
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:44 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1585068464230&de=406498035499&m=0&ar=b63606d9a9-clean&iw=d95b431&q=5&cb=0&ym=0&cu=1585068464230&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=How%20Prince%20of%20Persia%20Defeated%20Apple%20II%27s%20Memory%20Limitations%3A%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=5e5822b938d0690743f48b68&zMoatAP=-&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A507%3A551%3A2786%3A767&fs=177454&na=1326362266&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:44 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:44 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-03-24T16%3A47%3A45.469Z&_t=timespent&cBr=Ars%20Technica&cKe=exploits%7Cflaw%7Cmicrosoft%7Cvulnerabilities%7CWindows&cCh=information%20technology&cTi=Windows%20code-execution%20zeroday%20is%20under%20active%20exploit%2C%20Microsoft%20warns&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.47727889746646635%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951%2C%200.3389960975200951&cEnt=windows%2C%20microsoft%2C%20page%20layout%2C%20zeroday%2C%20remote%20code-execution%2C%20adobe%20type%201%2C%20adobe%20system%2C%20dan%20goodin%2C%20hacker%2C%20adobe%20type%20manager%2C%20utc%2C%20postscript%2C%20malicious%20payload%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar%2C%20rename%20atmfd.dll&cEnw=1%2C%200.8315457476124544%2C%200.6427029821559366%2C%200.5023301028670565%2C%200.4796852697653377%2C%200.4716311197846365%2C%200.4453950850636448%2C%200.3990321160576756%2C%200.3937633118795625%2C%200.38793267905948103%2C%200.36993762162244276%2C%200.3671049223370393%2C%200.3518169887813935%2C%200.32435051078562427%2C%200.290503240766117%2C%200.24531746048684747%2C%200.23743691924222773%2C%200.23722376840188938%2C%200.23485826353871672%2C%200.23333092453202628&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&org_id=4gKgcFGUFUvCGFzHakTPfYp85Yi8&cCl=726&cId=1662596&cPd=2020-03-23T19%3A40%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code&pRt=referral&pHp=%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=45cc024e-2e4a-4cf1-8edd-42838682f3a3&sID=d2295082-9c4e-4f0a-89cf-7c1c4de86dc2&pID=7c0fd8fb-c226-43d4-be42-751b5d823b7d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=e5c9cc46-4fd7-4b14-8f66-79319457ca3f&_v=5000&environment=prod&origin=ars-technica&cKh=windows%2Cmicrosoft%2Cvulnerability%2Cattacker%2Cpage%20layout
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.152.193 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-152-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 24 Mar 2020 16:47:45 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.184.25 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-231-184-25.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Tue, 24 Mar 2020 16:47:46 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&cu=1585068459028&m=7337&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5189&an=1159&gi=1&gf=5189&gg=1159&ix=5189&ic=5189&ez=1&ck=1159&kw=1011&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5189&bx=1159&ci=1159&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5041&cd=1011&ah=5041&am=1011&rf=0&re=1&ft=2109&fv=0&fw=2109&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=734680426&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:46 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:46 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=501553923761&rx=933618523988&cu=1585068459028&m=7339&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5016&an=1190&gi=1&gf=5016&gg=1190&ix=5016&ic=5016&ez=1&ck=1190&kw=1012&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5016&bx=1190&ci=1190&jz=1012&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4841&cd=1012&ah=4841&am=1012&rf=0&re=1&ft=2109&fv=0&fw=2109&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=870156955&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:46 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:46 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&cu=1585068459028&m=7540&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5391&an=5189&gi=1&gf=5391&gg=5189&ix=5391&ic=5391&ez=1&ck=1159&kw=1011&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5391&bx=5189&ci=1159&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5242&cd=5041&ah=5242&am=5041&rf=0&re=1&ft=2311&fv=2109&fw=2109&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=2026816417&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:46 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:46 GMT
identity
api.rlcdn.com/api/
0
203 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope&cv=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA&ct=1
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.244.174.68 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
68.174.244.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 24 Mar 2020 16:47:47 GMT
via
1.1 google
alt-svc
clear
status
204
access-control-allow-methods
GET, OPTIONS
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
access-control-allow-headers
Cookie, Accept, Origin, Authorization, Content-Type
placementbid.json
an.facebook.com/v2/
96 B
1 KB
XHR
General
Full URL
https://an.facebook.com/v2/placementbid.json?sdk=5.5.web&placementids%5B%5D=2038188213062675_2473096466238512&adformats%5B%5D=300x250&cachebuster=iweUFnBpQZFDwBDbBi4rxG2YKrCSwL9JSypTyQmjOzdyuK1qQZ94KWhI&platform=2061185240785516&adapterver=2.1.0
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
f8e48eca636fc6f3b5cc491c0006bb1e8431141bcf2ca1e62c2b13129ecc8f51
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-content-type-options
nosniff
x-fb-an-errors
access-control-expose-headers
X-FB-AN-Request-ID, X-FB-AN-Errors, X-FB-AN-Bid-Count
x-fb-an-request-id
8567228964225889482
status
200
alt-svc
h3-27=":443"; ma=3600
x-xss-protection
0
pragma
no-cache
x-fb-debug
NgUECnH0d4Vxyq1gAsf4p0HLhXhd4CxUqeLQS/ZYcaXJl+3gjQUmVFw4vhJNkCYeGRgiwImzAzYBdO2pX0OV/A==
x-frame-options
DENY
date
Tue, 24 Mar 2020 16:47:47 GMT, Tue, 24 Mar 2020 16:47:47 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://arstechnica.com
x-fb-an-bid-count
0
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
expires
Sat, 01 Jan 2000 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
743 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1537754&kw=rp.fastlane&tk_flint=index&rand=0.5804760848259707&gdpr=1&gdpr_consent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA&alt_size_ids=10
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
d543981eac31befdf4c89ba50c3666172485d68adbd375bf52d911844f3e6921

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:47 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=60
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
66 B
478 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A32634034%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2233%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2231%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22d6dcd3bc-b620-486a-9fad-cbc8c669a415%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-03-24T16%3A47%3A39%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
10258b49ec6568dba45800927e6f03297dac8061ef16f13fc21289b8ef6d9bfc

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:47 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Tue, 24 Mar 2020 16:47:47 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=87&profileId=154&cb=72307403202
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Tue, 24 Mar 2020 16:47:47 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467529;callback=window.headertag.AolHtb.adResponseCallbacks._ACkObnwq;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
103 B
136 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467529;callback=window.headertag.AolHtb.adResponseCallbacks._ACkObnwq;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
c0eb7853e47d639cb1613ccdd0c2cf69cbda0590b881eafa4649dde90b9fb729

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:47 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
103
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467529;callback=window.headertag.AolHtb.adResponseCallbacks._QTC8boPx;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
104 B
137 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467529;callback=window.headertag.AolHtb.adResponseCallbacks._QTC8boPx;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
b4b347d72208e03eeb97afa0c1ed80706924aed825be54da0df65782577fdb57

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:47 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=87&profileId=154&cb=9702897049
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Tue, 24 Mar 2020 16:47:47 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
cygnus
as-sec.casalemedia.com/
66 B
478 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A55824313%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%227%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%228%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22d6dcd3bc-b620-486a-9fad-cbc8c669a415%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-03-24T16%3A47%3A39%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9a49021f056af7bba3bd48a8406ba83210670fd927c350b64a177271c821857d

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:47 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Tue, 24 Mar 2020 16:47:47 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
743 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1537752&kw=rp.fastlane&tk_flint=index&rand=0.8589528128768542&gdpr=1&gdpr_consent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA&alt_size_ids=57
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
444b24088fe2d3a73eb833fd3b580a164c997b1dcb5eccbe501281d7ed6c5434

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:47 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=452
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467533;callback=window.headertag.AolHtb.adResponseCallbacks._sBEZLGhC;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
102 B
135 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467533;callback=window.headertag.AolHtb.adResponseCallbacks._sBEZLGhC;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
e1a2c0ff813cce767ad3de3b58dd997774ef595d8495e26898016905daeac5f3

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:47 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
102
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467534;callback=window.headertag.AolHtb.adResponseCallbacks._eJ0QehVS;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
104 B
322 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1585068467534;callback=window.headertag.AolHtb.adResponseCallbacks._eJ0QehVS;gdpr=1;euconsent=BOwxkC1OwxkC1AcABBENDBAAAAAuiAAA;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
67158aaed4c52179ff24b082d72ce8940424bffcd700a61756763ed47c6d14b3

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:47 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:47 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 24 Mar 2020 16:47:47 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 16:47:48 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 24 Mar 2020 16:47:48 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.184.25 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-231-184-25.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
Origin
https://arstechnica.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Tue, 24 Mar 2020 16:47:49 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=51942240946&rx=933618523988&cu=1585068459028&m=12161&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10013&an=5391&gi=1&gf=10013&gg=5391&ix=10013&ic=10013&ez=1&ck=1159&kw=1011&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10013&bx=5391&ci=1159&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9865&cd=5242&ah=9865&am=5242&rf=0&re=1&ft=5027&fv=2311&fw=2109&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1773118345&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:51 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:51 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjhBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&id=1&f=0&j=&t=1585068459028&de=501553923761&rx=933618523988&cu=1585068459028&m=12362&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4628&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10041&an=5016&gi=1&gf=10041&gg=5016&ix=10041&ic=10041&ez=1&ck=1190&kw=1012&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10041&bx=5016&ci=1190&jz=1012&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9866&cd=4841&ah=9866&am=4841&rf=0&re=1&ft=5027&fv=2109&fw=2109&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=987985476&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
95.101.185.246 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 16:47:51 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 24 Mar 2020 16:47:51 GMT

Verdicts & Comments Add Verdict or Comment

150 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| ars object| dataLayer object| googletag object| cns object| sparrowQueue object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| cnBus function| moatYieldReady object| _perfRefForUserTimingPolyfill object| __core-js_shared__ object| core object| fastdom object| BOOMR_mq object| regeneratorRuntime object| apstag object| headertag boolean| apstagLOADED object| google_tag_manager function| postscribe number| google_srt undefined| google_measure_js_timing function| gotSegmentData string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga string| b object| h function| getVisitNumCustom number| d object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady16316543 object| CN number| __google_ad_urls_id number| google_unique_id object| gaGlobal undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| pxSrc undefined| px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_8802711 object| Moat#PML#26#1.2 boolean| Moat#EVA object| moatPrebidApi function| get_real_link object| __SKIM_JS_GLOBAL__ object| skimlinksAPI object| _cne function| __cmp string| hash object| PolarConde object| NATIVEADS object| NATIVEADS_QUEUE object| google_tag_data object| gaplugins object| ActionButton object| SparrowConfigV2 function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| PARSELY object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| sparrow object| gaData object| NATIVEADS_STORE object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups function| OptanonWrapper function| addUspapiFrame function| optOutMsgHandler function| __uspapi object| usPrivacyCookie object| gamoo object| otCcpaOptOut function| dnsfeed function| jsonFeed object| Criteo function| headertag_render object| rubicontag object| criteo_pubtag object| otStubData object| __otccpaooLocation object| adsbygoogle object| OBR string| OB_releaseVer function| OBR$ object| OB_PROXY object| outbrain object| outbrain_rater object| Optanon object| OneTrust object| otCMP object| otIabModule object| _google_rum_ns_ object| google_persistent_state_async number| google_global_correlator object| closure_lm_720465 object| google object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired undefined| ad function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| closure_lm_233588 object| GoogleGcLKhOms object| google_image_requests function| arrive function| unbindArrive function| leave function| unbindLeave

25 Cookies

Domain/Path Name / Value
.casalemedia.com/ Name: CMRUM3
Value: 585e7a39ab2760Xno5qwAAAI_LAxJS&4d5e7a39ab05a00&2e5e7a39ab05a0&495e7a39ab05a00&2d5e7a39ab2760CAESEJKC9imnZuUB7vcNbegogYs&695e7a39ab05a00&1f5e7a39ab05a00&c35e7a39ab2760av-9c87c07e-4138-4b6a-8363-3253afc0f36c
.outbrain.com/ Name: recs_5edbafdcd49d61da831080d405a351d5
Value: 0B1925901673A2640657707A2520912267A2695636444A2722630128A2668632062ACD1
.doubleclick.net/ Name: IDE
Value: AHWqTUlXc-OSkJdcg-8BnI6yCvb3MS7ZeMNtU3pl5miQ7BE-BRZP3o6YUXNXv8-2
.casalemedia.com/ Name: CMST
Value: Xno5q156OasA
.arstechnica.com/ Name: OptanonConsent
Value: isIABGlobal=false&datestamp=Tue+Mar+24+2020+17%3A47%3A39+GMT%2B0100+(Central+European+Standard+Time)&version=5.13.0&landingPath=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F03%2Fattackers-exploit-windows-zeroday-that-can-execute-malicious-code%2F&groups=C0003%3A0%2CC0002%3A0%2CC0004%3A0%2CC0005%3A0%2CC0001%3A1&hosts=xvr%3A0%2Ckhg%3A0%2Cvpf%3A0%2Cbhq%3A0%2Cvrh%3A0%2Czdh%3A0%2Cxik%3A0%2Cpcj%3A0%2Cudm%3A0%2Cwuk%3A0%2Cots%3A0%2CH99%3A0%2Cyla%3A0%2Cixz%3A0%2Cvgv%3A0%2Cjgk%3A0%2Crea%3A0%2Cceq%3A0%2Czci%3A0%2Ceuw%3A0%2Cdwu%3A0%2Ceyl%3A0%2Ckhg%3A0%2Cwul%3A0%2Cbup%3A0%2Cdce%3A0%2CH187%3A0%2CH30%3A0%2CH188%3A0%2Cppg%3A0%2Copx%3A0%2CH156%3A0%2Ctdj%3A0%2Cywk%3A0%2Cltd%3A0%2CH189%3A0%2Cpzi%3A0%2Cdnm%3A0%2Chrl%3A0%2Cuuk%3A0%2Czgf%3A0%2Cayv%3A0%2Crai%3A0%2Cktz%3A0%2Cdfh%3A0%2Clck%3A0%2Cxfv%3A0%2Cawx%3A0%2Chty%3A0%2Cbrf%3A0%2CH192%3A0%2Cszd%3A0%2CH193%3A0%2Cvrj%3A0%2Crpr%3A0%2Ckdk%3A0%2Cjjg%3A0%2Chbz%3A0%2Cdui%3A0%2Cstj%3A0%2Cyqw%3A0%2Cddu%3A0%2Cmfc%3A0%2Cmuz%3A0%2Cyze%3A0%2CH80%3A0%2Ctif%3A0%2Cdvt%3A0%2Cpzk%3A0%2Csjs%3A0%2Cviv%3A0%2CH196%3A0%2Csqk%3A0%2Catx%3A0%2Caiy%3A0%2Cgor%3A0%2Cqsc%3A0%2Cvef%3A0%2Clhp%3A0%2Cbvx%3A0%2Cbro%3A0%2Capv%3A0%2Cvhh%3A0%2CH164%3A0%2Cslt%3A0%2Cmlc%3A0%2Czsx%3A0%2Cous%3A0%2Ciqa%3A0%2CH155%3A0%2Cduq%3A0%2Cqih%3A0%2Cgif%3A0%2Cvif%3A0%2CH32%3A0%2Cuuk%3A1%2Cwtu%3A1%2Chiz%3A1%2Czsx%3A1
.arstechnica.com/ Name: _parsely_visitor
Value: {%22id%22:%2252ce58cf-fcaf-4e59-bd25-c7319e684480%22%2C%22session_count%22:1%2C%22last_session_ts%22:1585068459679}
arstechnica.com/ Name: CN_xid
Value: e5c9cc46-4fd7-4b14-8f66-79319457ca3f
.arstechnica.com/ Name: session_seen_posts
Value: 0
.arstechnica.com/ Name: _parsely_session
Value: {%22sid%22:1%2C%22surl%22:%22https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/%22%2C%22sref%22:%22%22%2C%22sts%22:1585068459679%2C%22slts%22:0}
.casalemedia.com/ Name: CMID
Value: Xno5q1VbLEcAAHZhEW4AAAEe
.arstechnica.com/ Name: _gid
Value: GA1.2.1583715159.1585068459
.arstechnica.com/ Name: _gat_UA-31997-1
Value: 1
.arstechnica.com/ Name: _dc_gtm_UA-31997-1
Value: 1
arstechnica.com/ Name: usprivacy
Value: 1---
.arstechnica.com/ Name: AMP_TOKEN
Value: %24NOT_FOUND
arstechnica.com/ Name: CN_su
Value: 3e7fca89-d990-4a2e-959f-904c3f519aba
.casalemedia.com/ Name: CMPS
Value: 1199
arstechnica.com/ Name: cneplayercount
Value: 1
arstechnica.com/ Name: CN_sp
Value: 45cc024e-2e4a-4cf1-8edd-42838682f3a3
.arstechnica.com/ Name: seen_posts
Value:
arstechnica.com/ Name: pID
Value: 7c0fd8fb-c226-43d4-be42-751b5d823b7d
.arstechnica.com/ Name: sID
Value: d2295082-9c4e-4f0a-89cf-7c1c4de86dc2
.arstechnica.com/ Name: __gads
Value: ID=0bae1e4a5d82669d:T=1585068459:S=ALNI_MZj0ANXYzXLsixWxD0wq1p6LO3O_Q
.casalemedia.com/ Name: CMPRO
Value: 1141
.arstechnica.com/ Name: _ga
Value: GA1.2.626944428.1585068459

3 Console Messages

Source Level URL
Text
console-api log URL: https://cdn.cookielaw.org/opt-out/otCCPAiab.js(Line 96)
Message:
received a request for uspapi
console-api log URL: https://static.criteo.net/js/ld/publishertag.js(Line 1)
Message:
%cPubTag color: #fff; background: #ff8f1c; display: inline-block; padding: 1px 4px; border-radius: 3px; ERROR: Error onError: TypeError: Cannot read property 'getItem' of null
console-api log URL: https://static.criteo.net/js/ld/publishertag.js(Line 1)
Message:
%cPubTag color: #fff; background: #ff8f1c; display: inline-block; padding: 1px 4px; border-radius: 3px; ERROR: Error onError: TypeError: Cannot read property 'getItem' of null

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ampcid.google.com
ampcid.google.de
an.facebook.com
api.actionbutton.co
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
bidder.criteo.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.arstechnica.net
cdn.cookielaw.org
cdn.mediavoice.com
connect.facebook.net
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dwgyu36up6iuz.cloudfront.net
embed.actionbutton.co
fastlane.rubiconproject.com
geolocation.1trust.app
geolocation.onetrust.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
mb.moatads.com
mcdp-chidc2.outbrain.com
mid.rkdms.com
odb.outbrain.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-terrax.com
pubads.g.doubleclick.net
px.moatads.com
r.skimresources.com
s.skimresources.com
s0.2mdn.net
securepubads.g.doubleclick.net
segment-data.zqtk.net
srv-2020-03-24-16.config.parsely.com
srv-2020-03-24-16.pixel.parsely.com
static.criteo.net
stats.g.doubleclick.net
t.skimresources.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
widgets.outbrain.com
wren.condenastdigital.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
z.moatads.com
13.35.254.113
13.92.139.214
143.204.179.185
143.204.201.109
143.204.201.121
143.204.201.65
143.204.208.131
143.204.213.153
151.101.114.2
151.101.12.239
151.139.128.10
152.195.132.202
152.199.21.89
172.217.16.194
172.217.22.2
178.250.0.165
205.234.175.175
2606:4700:10::6814:b844
2606:4700::6811:4132
2606:4700::6812:da5d
2606:4700::6813:da83
2a00:1450:4001:800::2003
2a00:1450:4001:800::2008
2a00:1450:4001:809::2004
2a00:1450:4001:809::2006
2a00:1450:4001:817::200e
2a00:1450:4001:818::200a
2a00:1450:4001:81a::2002
2a00:1450:4001:81b::2001
2a00:1450:4001:81b::200e
2a00:1450:4001:81d::200e
2a00:1450:4001:81f::2002
2a00:1450:400c:c0c::9d
2a02:2638::3
2a03:2880:f01c:800e:face:b00c:0:2
2a03:2880:f01c:8012:face:b00c:0:3
3.130.45.15
3.220.246.137
34.205.105.54
34.231.184.25
34.232.138.226
35.190.40.172
35.190.59.101
35.201.67.47
35.244.174.68
50.31.142.63
52.19.88.177
52.202.152.193
52.213.78.12
52.22.87.69
52.23.50.9
54.229.6.20
64.202.112.31
69.173.144.143
72.247.226.107
95.101.185.159
95.101.185.246
95.101.185.51
99.86.3.40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