Submitted URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Effective URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Submission: On July 09 via manual from US

Summary

This website contacted 12 IPs in 3 countries across 10 domains to perform 60 HTTP transactions. The main IP is 52.4.145.119, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is hackernoon.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on February 18th 2019. Valid for: a year.
This is the only time hackernoon.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 4 52.4.145.119 14618 (AMAZON-AES)
1 11 2606:4700::68... 13335 (CLOUDFLAR...)
26 2606:4700::68... 13335 (CLOUDFLAR...)
1 3 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.85.182.60 16509 (AMAZON-02)
10 23.23.71.11 14618 (AMAZON-AES)
1 54.230.202.112 16509 (AMAZON-02)
1 2600:9000:200... 16509 (AMAZON-02)
2 2600:9000:200... 16509 (AMAZON-02)
1 3.216.32.87 14618 (AMAZON-AES)
60 12
Domain Requested by
17 cdn-images-1.medium.com hackernoon.com
11 medium.com 1 redirects cdn-static-1.medium.com
hackernoon.com
10 collector-medium.lightstep.com cdn-static-1.medium.com
hackernoon.com
5 glyph.medium.com hackernoon.com
4 cdn-static-1.medium.com hackernoon.com
cdn-static-1.medium.com
4 hackernoon.com 1 redirects hackernoon.com
cdn-static-1.medium.com
3 www.google-analytics.com 1 redirects hackernoon.com
2 api2.branch.io cdn.branch.io
1 srv-2019-07-09-20.pixel.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 app.link cdn.branch.io
1 cdn.branch.io hackernoon.com
1 d1z2jf7jlzjs58.cloudfront.net hackernoon.com
1 stats.g.doubleclick.net hackernoon.com
0 i.embed.ly Failed hackernoon.com
60 14
Subject Issuer Validity Valid
hackernoon.com
Sectigo RSA Domain Validation Secure Server CA
2019-02-18 -
2020-02-18
a year crt.sh
*.medium.com
DigiCert SHA2 Secure Server CA
2018-07-31 -
2020-09-09
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-06-18 -
2019-09-10
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-06-18 -
2019-09-10
3 months crt.sh
*.cloudfront.net
DigiCert Global CA G2
2018-10-08 -
2019-10-09
a year crt.sh
medium.com
DigiCert SHA2 Extended Validation Server CA
2017-06-01 -
2019-08-30
2 years crt.sh
*.lightstep.com
Let's Encrypt Authority X3
2019-04-30 -
2019-07-29
3 months crt.sh
*.branch.io
DigiCert SHA2 Secure Server CA
2018-12-05 -
2020-12-08
2 years crt.sh
appipv4.link
Amazon
2018-09-17 -
2019-10-17
a year crt.sh
*.pixel.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh

This page contains 1 frames:

Primary Page: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Frame ID: C40DBFB8F1311CC18958A2A208B7A908
Requests: 64 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142... HTTP 302
    https://medium.com/m/global-identity?redirectUrl=https%3A%2F%2Fhackernoon.com%2Fdeauthenticatio... HTTP 302
    https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • script /medium\.com/i

Overall confidence: 100%
Detected patterns
  • script /medium\.com/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Page Statistics

60
Requests

97 %
HTTPS

55 %
IPv6

10
Domains

14
Subdomains

12
IPs

3
Countries

1343 kB
Transfer

4124 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d HTTP 302
    https://medium.com/m/global-identity?redirectUrl=https%3A%2F%2Fhackernoon.com%2Fdeauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d HTTP 302
    https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 23
  • https://www.google-analytics.com/r/collect?v=1&_v=j77&a=2076859440&t=pageview&_s=1&dl=https%3A%2F%2Fhackernoon.com%2Fdeauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d%3Fgi%3Df562b01610e6&ul=en-us&de=UTF-8&dt=Deauthentication%20attack%20and%20other%20%E2%80%98wifi%20hacks%E2%80%99%20using%20an%20ESP8266%20module.&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEDAAEAB~&jid=1837758694&gjid=2041583368&cid=194049825.1562705732&tid=UA-65623566-4&_gid=1748348166.1562705732&_r=1&z=1755034615 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-65623566-4&cid=194049825.1562705732&jid=1837758694&_gid=1748348166.1562705732&gjid=2041583368&_v=j77&z=1755034615

60 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
hackernoon.com/
Redirect Chain
  • https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
  • https://medium.com/m/global-identity?redirectUrl=https%3A%2F%2Fhackernoon.com%2Fdeauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
  • https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
612 KB
133 KB
Document
General
Full URL
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.4.145.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-145-119.compute-1.amazonaws.com
Software
nginx / Medium
Resource Hash
edfd68cf67f6fa0bc76c6d0bbb59525f1dd397618d8ce3177ed10f3371c2d493
Security Headers
Name Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://hackernoon.com https://*.hackernoon.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
hackernoon.com
:scheme
https
:path
/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
nginx
date
Tue, 09 Jul 2019 20:55:31 GMT
content-type
text/html; charset=utf-8
set-cookie
uid=lo_m7X3E18rfqCM; path=/; expires=Wed, 08 Jul 2020 20:55:29 GMT; secure; httponly sid=1:MYTkib3qs2lDRSXPimYKrc7eY14iyo2ytYFfxJBz7/WeAp7ETTXEYGVKIfuiMQbz; path=/; expires=Wed, 08 Jul 2020 20:55:29 GMT; secure; httponly
sepia-upstream
medium
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://hackernoon.com https://*.hackernoon.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
x-frame-options
sameorigin
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
x-powered-by
Medium
x-obvious-tid
1562705729972:a01121c9b65e
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
link
<https://medium.com/humans.txt>; rel="humans"
cache-control
no-cache, no-store, max-age=0, must-revalidate
expires
Thu, 09 Sep 1999 09:09:09 GMT
pragma
no-cache
tk
T
content-encoding
gzip

Redirect headers

status
302
date
Tue, 09 Jul 2019 20:55:29 GMT
content-type
application/octet-stream
set-cookie
__cfduid=dab718b670c5d7de4027c97c8701fde7d1562705729; expires=Wed, 08-Jul-20 20:55:29 GMT; path=/; domain=.medium.com; HttpOnly uid=lo_m7X3E18rfqCM; Expires=Wed, 08-Jul-20 20:55:29 GMT; Domain=.medium.com; Path=/; Secure; HttpOnly sid=1:yPSTPRYDjpuImRZ54F1wIa8nYjX/ZuZMeuKMvHrZ5LTaQqM3XLQ1XYrXzuKRLswR; path=/; expires=Wed, 08 Jul 2020 20:55:29 GMT; domain=.medium.com; secure; httponly __cfruid=80e7ba08a3ca89cb33400ec1dc685765c0d5a524-1562705729; path=/; domain=.medium.com; HttpOnly
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
x-frame-options
sameorigin
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
x-powered-by
Medium
x-obvious-tid
1562705729779:5c4a5ef91a86
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
link
<https://medium.com/humans.txt>; rel="humans"
cache-control
no-cache, no-store, max-age=0, must-revalidate
expires
Thu, 09 Sep 1999 09:09:09 GMT
pragma
no-cache
tk
T
location
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
strict-transport-security
max-age=15552000; includeSubDomains; preload
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
4f3d32fabd1ad711-FRA
m2.css
glyph.medium.com/css/e/sr/latin/e/ssr/latin/e/ssb/latin/
44 KB
29 KB
Stylesheet
General
Full URL
https://glyph.medium.com/css/e/sr/latin/e/ssr/latin/e/ssb/latin/m2.css
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
087a4c7aa118304c5ce85d5917d95a49b3c93204ef3500752dfde52595e4eac6
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
1156
status
200
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
86400
access-control-allow-methods
GET, POST, PUT, DELETE
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=14400
access-control-allow-credentials
true
cf-ray
4f3d3309fde0d6bd-FRA
access-control-allow-headers
Accept, Cache-Control, Content-Type, Cookie, DNT, Origin, User-Agent, X-Client-Date, X-Obvious-Cid, X-Opentracing, X-Xsrf-Token, ot-tracer-sampled, ot-tracer-spanid, ot-tracer-traceid
expires
Wed, 10 Jul 2019 00:55:32 GMT
main-branding-base.DUpq82k2YI6OvEW6173IfA.css
cdn-static-1.medium.com/_/fp/css/
510 KB
64 KB
Stylesheet
General
Full URL
https://cdn-static-1.medium.com/_/fp/css/main-branding-base.DUpq82k2YI6OvEW6173IfA.css
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6f8c1ebdb0bdb82d44043c44ba8c495dc6c1e0d81f3d0f906a91d4135a1d0fb9
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
707135
status
200
vary
Accept-Encoding
content-length
65528
x-amz-id-2
RaQbHr8MIsuc65cvY4xlgOt9YpRR70sixHymAUqsz7RKMoXVi8XIHSOehKocu0/EcshYRGysnjk=
last-modified
Fri, 28 Jun 2019 23:23:43 GMT
server
cloudflare
etag
"be6e2f630f44467cb2a3a20b22b3a28f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-amz-request-id
D653A87CED96C9DE
content-type
text/css
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4f3d3309fdded6bd-FRA
expires
Wed, 08 Jul 2020 20:55:32 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a4883cce814b6793c5bd6dd3639d6048ecab39a93a90b560d39a9fd0aff6e263
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 20 Jun 2019 21:35:04 GMT
server
Golfe2
age
1674
date
Tue, 09 Jul 2019 20:27:38 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
17707
expires
Tue, 09 Jul 2019 22:27:38 GMT
1*1HcGNZYjo78mH0faO3BnaQ.png
cdn-images-1.medium.com/letterbox/600/72/50/50/
3 KB
3 KB
Image
General
Full URL
https://cdn-images-1.medium.com/letterbox/600/72/50/50/1*1HcGNZYjo78mH0faO3BnaQ.png?source=logoAvatar-lo_m7X3E18rfqCM---3a8144eabfe3
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
578a87e570e5c11ba11bf488c0ccf35da147b64599926991c5c22296ead82237
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
MISS
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3196-7da812a
status
200
vary
Accept-Encoding
content-length
3483
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d3309fdcbd6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
1*KVs_tfUQ07C7sKYSjEQGzg.png
cdn-images-1.medium.com/fit/c/100/100/
10 KB
11 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/100/100/1*KVs_tfUQ07C7sKYSjEQGzg.png
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
1d9cf260857ba919d4a08e9ed8243affd04714525ea1eab276db29df9c0cd3f2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
2125318
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
10502
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d3309fdced6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
1*gUVsVKC7zm-02LiNOdDN1Q.jpeg
cdn-images-1.medium.com/freeze/max/60/
939 B
1 KB
Image
General
Full URL
https://cdn-images-1.medium.com/freeze/max/60/1*gUVsVKC7zm-02LiNOdDN1Q.jpeg?q=20
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
a391a7ab63daf0bd945659c7cd4ad77d6e5771de2f92ab2bbe71bf8caf5482a0
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Origin
https://hackernoon.com

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
206235
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
939
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330a5f11d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
0*OTqVlg72VaoSw5fV.jpg
cdn-images-1.medium.com/freeze/max/60/
1 KB
1 KB
Image
General
Full URL
https://cdn-images-1.medium.com/freeze/max/60/0*OTqVlg72VaoSw5fV.jpg?q=20
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
a5301513f8b8e40c8f57679e9f5b8b96ffd6f14ad11479480361cd361ec0466f
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Origin
https://hackernoon.com

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
1547987
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
1058
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330a5f14d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
1*RxvEoyRwPcqDzQUNhfk_9A.jpeg
cdn-images-1.medium.com/freeze/max/60/
922 B
996 B
Image
General
Full URL
https://cdn-images-1.medium.com/freeze/max/60/1*RxvEoyRwPcqDzQUNhfk_9A.jpeg?q=20
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
62daadf28861f33e56ec9e7dfbfa6948a5ac33f0cbf00eed6640692e6df7a83a
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Origin
https://hackernoon.com

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
194780
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
922
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330a5f13d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
resize
i.embed.ly/1/display/
0
0

resize
i.embed.ly/1/display/
0
0

1*KVs_tfUQ07C7sKYSjEQGzg.png
cdn-images-1.medium.com/fit/c/120/120/
14 KB
14 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/120/120/1*KVs_tfUQ07C7sKYSjEQGzg.png
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
fac2fe0825791af35822e4c8f6835635eb2cf8368b717594430a7c8d8925f188
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
1856986
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
14203
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330a3ea9d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
1*76XiKOa05Yya6_CdYX8pVg.jpeg
cdn-images-1.medium.com/fit/c/120/120/
3 KB
3 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/120/120/1*76XiKOa05Yya6_CdYX8pVg.jpeg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
fe6df6266fc048d0eaf630e316032bcc8790b69105c2e69c322d543d37eba83b
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
2140063
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
3433
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330a3eabd6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
1*76XiKOa05Yya6_CdYX8pVg.jpeg
cdn-images-1.medium.com/fit/c/80/80/
2 KB
2 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/80/80/1*76XiKOa05Yya6_CdYX8pVg.jpeg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
f4a9ee09672ea6b458040a67cdb6707eb25168dfee7db880abe28ba75b9ddf3a
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
2050683
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
2472
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330a3eacd6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
cdn-static-1.medium.com/_/fp/gen-js/
1 MB
334 KB
Script
General
Full URL
https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a2d55ce06c19987087d633dccd84682fda6476cd4ae5c3c52710940673f33ca5
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
15932
status
200
vary
Accept-Encoding
content-length
341461
x-amz-id-2
pbjaeoH3aR9dJlyeXpQ8vchn9Z0v/lniBqBlDBiv4mtIZnFEVIiQ2tlSla0I/zekzAuxevdd1/I=
last-modified
Mon, 08 Jul 2019 22:26:54 GMT
server
cloudflare
etag
"8d08a29c9fff5f80f9fa88819fc9a414"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-amz-request-id
4B323F9A4C76E7F1
content-type
application/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4f3d330a3eadd6bd-FRA
expires
Wed, 08 Jul 2020 20:55:32 GMT
stat
hackernoon.com/_/
43 B
1 KB
Image
General
Full URL
https://hackernoon.com/_/stat?event=pixel.load&origin=https%3A%2F%2Fhackernoon.com
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.4.145.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-145-119.compute-1.amazonaws.com
Software
nginx / Medium
Resource Hash
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49
Security Headers
Name Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://hackernoon.com https://*.hackernoon.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
200
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
pragma
no-cache
x-obvious-tid
1562705732231:9fffe1784baf
server
nginx
tk
T
x-frame-options
sameorigin
content-type
image/gif
cache-control
no-cache, no-store, max-age=0, must-revalidate
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://hackernoon.com https://*.hackernoon.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
link
<https://medium.com/humans.txt>; rel="humans"
expires
Thu, 09 Sep 1999 09:09:09 GMT
truncated
/
149 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a1a9f0f2844d80ca5a41f2d483d56d674eb333e570706b935cf46add6aa2f31d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
9 KB
9 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
99c5448d6c84fc71d6805e2485727db250113edcaea123a064f8c26ce95947d8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Origin
https://hackernoon.com

Response headers

Content-Type
font/opentype
fell-400-normal.woff
glyph.medium.com/font/78ce731/0-3j_4g_6bu_6c4_6c8_6c9_6cc_6cd_6ci_6cm/
14 KB
14 KB
Font
General
Full URL
https://glyph.medium.com/font/78ce731/0-3j_4g_6bu_6c4_6c8_6c9_6cc_6cd_6ci_6cm/fell-400-normal.woff
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f57137897a4e676f0d2199b79def1a95b253a1a938dff9d8ba10519f3beb2b08
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://glyph.medium.com/css/e/sr/latin/e/ssr/latin/e/ssb/latin/m2.css
Origin
https://hackernoon.com

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
11966944
status
200
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
86400
access-control-allow-methods
GET, POST, PUT, DELETE
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
access-control-allow-credentials
true
cf-ray
4f3d330a7f71d6bd-FRA
access-control-allow-headers
Accept, Cache-Control, Content-Type, Cookie, DNT, Origin, User-Agent, X-Client-Date, X-Obvious-Cid, X-Opentracing, X-Xsrf-Token, ot-tracer-sampled, ot-tracer-spanid, ot-tracer-traceid
expires
Wed, 08 Jul 2020 20:55:32 GMT
truncated
/
10 KB
10 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a3d669b687929b3aa777fdd2c400c2b8c6b794978536a64d7e1f71edcf8037e8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Origin
https://hackernoon.com

Response headers

Content-Type
font/opentype
charter-400-italic.woff
glyph.medium.com/font/81d2bf1/0-3j_4g_6bu_6c4_6c8_6c9_6cc_6cd_6ci_6cm/
10 KB
11 KB
Font
General
Full URL
https://glyph.medium.com/font/81d2bf1/0-3j_4g_6bu_6c4_6c8_6c9_6cc_6cd_6ci_6cm/charter-400-italic.woff
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f0b9a9e4ea994c106a4fc595828ca1332b2cd0435d5d159d26d1773344d97367
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://glyph.medium.com/css/e/sr/latin/e/ssr/latin/e/ssb/latin/m2.css
Origin
https://hackernoon.com

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
12785749
status
200
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
86400
access-control-allow-methods
GET, POST, PUT, DELETE
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
access-control-allow-credentials
true
cf-ray
4f3d330a7f9ad6bd-FRA
access-control-allow-headers
Accept, Cache-Control, Content-Type, Cookie, DNT, Origin, User-Agent, X-Client-Date, X-Obvious-Cid, X-Opentracing, X-Xsrf-Token, ot-tracer-sampled, ot-tracer-spanid, ot-tracer-traceid
expires
Wed, 08 Jul 2020 20:55:32 GMT
truncated
/
10 KB
10 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ef1ed6a034a5055a869c7c25765ee1f2844a27a54e83e8a857d77b3f1cd83dd3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Origin
https://hackernoon.com

Response headers

Content-Type
font/opentype
marat-sans-400-normal.woff
glyph.medium.com/font/d8659c9/3k-4f_4h-6bt_6bv-6c3_6c5-6c7_6ca-6cb_6ce-6ch_6cj-6cl_6cn-nvnj/
14 KB
15 KB
Font
General
Full URL
https://glyph.medium.com/font/d8659c9/3k-4f_4h-6bt_6bv-6c3_6c5-6c7_6ca-6cb_6ce-6ch_6cj-6cl_6cn-nvnj/marat-sans-400-normal.woff
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
12fe85ec038af8c41ba830412520589dbd125d417913c10a57838ac92ab96192
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://glyph.medium.com/css/e/sr/latin/e/ssr/latin/e/ssb/latin/m2.css
Origin
https://hackernoon.com

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
13174863
status
200
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
86400
access-control-allow-methods
GET, POST, PUT, DELETE
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
access-control-allow-credentials
true
cf-ray
4f3d330a6f4bd6bd-FRA
access-control-allow-headers
Accept, Cache-Control, Content-Type, Cookie, DNT, Origin, User-Agent, X-Client-Date, X-Obvious-Cid, X-Opentracing, X-Xsrf-Token, ot-tracer-sampled, ot-tracer-spanid, ot-tracer-traceid
expires
Wed, 08 Jul 2020 20:55:32 GMT
collect
www.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j77&a=2076859440&t=pageview&_s=1&dl=https%3A%2F%2Fhackernoon.com%2Fdeauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d%3Fgi%3Df562b01610e6&ul=en-us&de=UTF-8&dt=Deauthentication%20attack%20and%20other%20%E2%80%98wifi%20hacks%E2%80%99%20using%20an%20ESP8266%20module.&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAEAB~&jid=246879526&gjid=278433996&cid=194049825.1562705732&tid=UA-24232453-2&_gid=1748348166.1562705732&_r=1&z=1578717869
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j77&a=2076859440&t=pageview&_s=1&dl=https%3A%2F%2Fhackernoon.com%2Fdeauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-65623566-4&cid=194049825.1562705732&jid=1837758694&_gid=1748348166.1562705732&gjid=2041583368&_v=j77&z=1755034615
35 B
102 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-65623566-4&cid=194049825.1562705732&jid=1837758694&_gid=1748348166.1562705732&gjid=2041583368&_v=j77&z=1755034615
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c0c::9c Brussels, Belgium, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
date
Tue, 09 Jul 2019 20:55:32 GMT
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 09 Jul 2019 20:55:32 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-65623566-4&cid=194049825.1562705732&jid=1837758694&_gid=1748348166.1562705732&gjid=2041583368&_v=j77&z=1755034615
content-type
text/html; charset=UTF-8
status
302
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
419
expires
Fri, 01 Jan 1990 00:00:00 GMT
p.js
d1z2jf7jlzjs58.cloudfront.net/keys/medium.com/
41 KB
17 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/keys/medium.com/p.js
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.182.60 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-182-60.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
2ec3f1be2d2113c8735e56370fd02cd5171467e03711eb3aa73685991657a8c0

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 09 Jul 2019 00:21:54 GMT
Content-Encoding
gzip
Age
74006
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Sat, 08 Jun 2019 00:02:21 GMT
Server
nginx
ETag
W/"5cfafb0d-a4fb"
Content-Type
application/x-javascript
Via
1.1 3abf650c7bf73e47515000bddf3f05c0.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA50
X-Amz-Cf-Id
0M6JMRWhpHhe-rVu9FDe4sbRQwJfa7tOtxPkZS-U1yPFnMmTTCDwdg==
Expires
Wed, 10 Jul 2019 00:21:54 GMT
main-common-async.bundle.cUeGLoj7sHNpuw-bFOuTeQ.js
cdn-static-1.medium.com/_/fp/gen-js/
640 KB
174 KB
Script
General
Full URL
https://cdn-static-1.medium.com/_/fp/gen-js/main-common-async.bundle.cUeGLoj7sHNpuw-bFOuTeQ.js
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5820810892e6b9732140a8adead2ad4639849d01d0da6a4de3d3cbb9d5e92c0
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d?gi=f562b01610e6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
77990
status
200
vary
Accept-Encoding
content-length
177732
x-amz-id-2
yFTLhHhh+sLo7A96+n84ZJhh29PL+n32IGG7QqBPARr5wfWWZK9kePyC5sXEoIbIEmjxicvE7ow=
last-modified
Mon, 08 Jul 2019 21:53:24 GMT
server
cloudflare
etag
"485c580f46f777dcba69fa3a0fd6c682"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-amz-request-id
4D3CB6835C91BD73
content-type
application/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4f3d330bfcd4d6bd-FRA
expires
Wed, 08 Jul 2020 20:55:32 GMT
upvotes
medium.com/p/14f9142b063d/
0
148 B
XHR
General
Full URL
https://medium.com/p/14f9142b063d/upvotes
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Access-Control-Request-Method
GET
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,x-client-date,x-obvious-cid,x-opentracing,x-xsrf-token

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
204
access-control-max-age
86400
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
access-control-allow-headers
Accept, Content-Type, Origin, User-Agent, DNT, Cache-Control, X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, x-opentracing
x-obvious-tid
1562705732923:83cbbbb8cb3
server
cloudflare
x-frame-options
sameorigin
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
access-control-allow-methods
GET, POST, PUT, DELETE
access-control-allow-origin
https://hackernoon.com
cache-control
no-cache
access-control-allow-credentials
true
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
cf-ray
4f3d330c8e18d70d-FRA
link
<https://medium.com/humans.txt>; rel="humans"
1*gUVsVKC7zm-02LiNOdDN1Q.jpeg
cdn-images-1.medium.com/max/1600/
145 KB
146 KB
Image
General
Full URL
https://cdn-images-1.medium.com/max/1600/1*gUVsVKC7zm-02LiNOdDN1Q.jpeg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
29a0ecc696d7fecf3487770bbb570844ebea2b540a33764482b1e2520418d6c9
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
274673
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
148520
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330c6e63d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
0*OTqVlg72VaoSw5fV.jpg
cdn-images-1.medium.com/max/1600/
25 KB
25 KB
Image
General
Full URL
https://cdn-images-1.medium.com/max/1600/0*OTqVlg72VaoSw5fV.jpg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
03c2ae6c856da96c7b20fc1296e3617de1e895505ea6d6f1b2b3a62e0c9712a7
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
2537810
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
25644
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d330c6e65d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:32 GMT
main-notes.bundle.RzL89au1QllN2FPu92pO7w.js
cdn-static-1.medium.com/_/fp/gen-js/
87 KB
29 KB
Script
General
Full URL
https://cdn-static-1.medium.com/_/fp/gen-js/main-notes.bundle.RzL89au1QllN2FPu92pO7w.js
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
70a71e247c9de93233ddac3ccea8c9ded1e1cf86d8241fa981feb3598c3c3bee
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
80888
status
200
vary
Accept-Encoding
content-length
29063
x-amz-id-2
/CGjA7I1PrvcJ+OzD7XYVEECqJgC7+Ed82+x3140So1j1j3YD40Nd0fSdejymPrGYX9I1+LJDqs=
last-modified
Mon, 08 Jul 2019 21:25:11 GMT
server
cloudflare
etag
"e27093d4e2e86e8346f7175090aa921e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-amz-request-id
ED0039C30D174168
content-type
application/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4f3d330cafaad6bd-FRA
expires
Wed, 08 Jul 2020 20:55:32 GMT
quotes
medium.com/p/14f9142b063d/
0
2 KB
XHR
General
Full URL
https://medium.com/p/14f9142b063d/quotes
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Access-Control-Request-Method
GET
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,x-client-date,x-obvious-cid,x-xsrf-token

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
204
access-control-max-age
86400
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
access-control-allow-headers
Accept, Content-Type, Origin, User-Agent, DNT, Cache-Control, X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, x-opentracing
x-obvious-tid
1562705732851:ef1760f8c9c7
server
cloudflare
x-frame-options
sameorigin
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
access-control-allow-methods
GET, POST, PUT, DELETE
access-control-allow-origin
https://hackernoon.com
cache-control
no-cache
access-control-allow-credentials
true
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
cf-ray
4f3d330deb34d70d-FRA
link
<https://medium.com/humans.txt>; rel="humans"
responses
medium.com/_/api/posts/14f9142b063d/
0
149 B
XHR
General
Full URL
https://medium.com/_/api/posts/14f9142b063d/responses?filter=best
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Access-Control-Request-Method
GET
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,x-client-date,x-obvious-cid,x-opentracing,x-xsrf-token

Response headers

date
Tue, 09 Jul 2019 20:55:32 GMT
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
204
access-control-max-age
86400
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
access-control-allow-headers
Accept, Content-Type, Origin, User-Agent, DNT, Cache-Control, X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, x-opentracing
x-obvious-tid
1562705732842:34acddc0b85a
server
cloudflare
x-frame-options
sameorigin
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
access-control-allow-methods
GET, POST, PUT, DELETE
access-control-allow-origin
https://hackernoon.com
cache-control
no-cache
access-control-allow-credentials
true
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
cf-ray
4f3d330deb44d70d-FRA
link
<https://medium.com/humans.txt>; rel="humans"
reports
collector-medium.lightstep.com/api/v0/
0
174 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,lightstep-access-token

Response headers

status
200
date
Tue, 09 Jul 2019 20:55:33 GMT
access-control-allow-credentials
true
access-control-allow-origin
*
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
0
access-control-allow-methods
POST
quotes
medium.com/p/14f9142b063d/
97 B
488 B
XHR
General
Full URL
https://medium.com/p/14f9142b063d/quotes
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
ff1ee3d7480c0a00fb98a8b5f6c257a508f36096daf66cb350ede907bf93f4f1
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

X-Client-Date
1562705732782
Origin
https://hackernoon.com
X-XSRF-Token
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json
Accept
application/json
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
X-Obvious-CID
web

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
200
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
pragma
no-cache
link
<https://medium.com/humans.txt>; rel="humans"
x-obvious-tid
1562705732976:1c82e478fa4
server
cloudflare
x-frame-options
sameorigin
tk
T
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=utf-8
access-control-allow-origin
https://hackernoon.com
access-control-expose-headers
X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, X-Obvious-Profiling, X-Diagnostics, x-opentracing
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
cf-ray
4f3d330ebf04d711-FRA
x-opentracing
{"ot-tracer-spanid":"2839ccae01c5be9e","ot-tracer-traceid":"1560b9087a658812","ot-tracer-sampled":"true"}
expires
Thu, 09 Sep 1999 09:09:09 GMT
responses
medium.com/_/api/posts/14f9142b063d/
174 KB
39 KB
XHR
General
Full URL
https://medium.com/_/api/posts/14f9142b063d/responses?filter=best
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
24d3bbd5ba802c327e8e857400176235959ef97c90bbe2e840c1afe2da64c9ad
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

X-Client-Date
1562705732785
Origin
https://hackernoon.com
X-XSRF-Token
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json
X-Obvious-CID
web
Accept
application/json
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
x-opentracing
{"ot-tracer-spanid":"ab65ec147c1f7","ot-tracer-traceid":"12074aa5016d7","ot-tracer-sampled":"true"}

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
200
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
pragma
no-cache
x-obvious-tid
1562705732981:f120962a9e8d
server
cloudflare
x-frame-options
sameorigin
tk
T
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=utf-8
access-control-allow-origin
https://hackernoon.com
access-control-expose-headers
X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, X-Obvious-Profiling, X-Diagnostics, x-opentracing
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
cf-ray
4f3d330edf90d711-FRA
link
<https://medium.com/humans.txt>; rel="humans"
expires
Thu, 09 Sep 1999 09:09:09 GMT
upvotes
medium.com/p/14f9142b063d/
9 KB
2 KB
XHR
General
Full URL
https://medium.com/p/14f9142b063d/upvotes
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
0d95ff7e27cd4177b0b91c7b1163154e5f73ee0d1c4c13dc59c0362119b6eb12
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

X-Client-Date
1562705732525
Origin
https://hackernoon.com
X-XSRF-Token
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json
X-Obvious-CID
web
Accept
application/json
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
x-opentracing
{"ot-tracer-spanid":"1597d5b6df5eae","ot-tracer-traceid":"6ddd64b74bfd7411","ot-tracer-sampled":"true"}

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
200
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
pragma
no-cache
x-obvious-tid
1562705733038:5bab34f088ee
server
cloudflare
x-frame-options
sameorigin
tk
T
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=utf-8
access-control-allow-origin
https://hackernoon.com
access-control-expose-headers
X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, X-Obvious-Profiling, X-Diagnostics, x-opentracing
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
cf-ray
4f3d330f38bfd711-FRA
link
<https://medium.com/humans.txt>; rel="humans"
expires
Thu, 09 Sep 1999 09:09:09 GMT
responsesStream
medium.com/_/api/posts/14f9142b063d/
0
265 B
XHR
General
Full URL
https://medium.com/_/api/posts/14f9142b063d/responsesStream?filter=best
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Access-Control-Request-Method
GET
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,x-client-date,x-obvious-cid,x-opentracing,x-xsrf-token

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
204
access-control-max-age
86400
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
access-control-allow-headers
Accept, Content-Type, Origin, User-Agent, DNT, Cache-Control, X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, x-opentracing
x-obvious-tid
1562705733096:bfe13c52912
server
cloudflare
x-frame-options
sameorigin
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
access-control-allow-methods
GET, POST, PUT, DELETE
access-control-allow-origin
https://hackernoon.com
cache-control
no-cache
access-control-allow-credentials
true
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
cf-ray
4f3d330f88e9d70d-FRA
link
<https://medium.com/humans.txt>; rel="humans"
reports
collector-medium.lightstep.com/api/v0/
113 B
311 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
baa50bc1fe62b42c0e6cd74881e5f615bdb4dec43e3aa64d1a6142729a5e79d7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Origin
https://hackernoon.com
LightStep-Access-Token
ce5be895bef60919541332990ac9fef2
Content-Type
application/json

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
status
200
access-control-allow-methods
POST
content-type
application/json
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
113
responsesStream
medium.com/_/api/posts/14f9142b063d/
175 KB
38 KB
XHR
General
Full URL
https://medium.com/_/api/posts/14f9142b063d/responsesStream?filter=best
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
14d841edb82a1c3df55fd22150398289fe15a206e5ba1ea2b9864d772870a700
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

X-Client-Date
1562705733038
Origin
https://hackernoon.com
X-XSRF-Token
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json
X-Obvious-CID
web
Accept
application/json
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
x-opentracing
{"ot-tracer-spanid":"118301aa7d048a","ot-tracer-traceid":"187ce90947151e","ot-tracer-sampled":"true"}

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
200
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
pragma
no-cache
x-obvious-tid
1562705733230:1c0435281e1d
server
cloudflare
x-frame-options
sameorigin
tk
T
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=utf-8
access-control-allow-origin
https://hackernoon.com
access-control-expose-headers
X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, X-Obvious-Profiling, X-Diagnostics, x-opentracing
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
cf-ray
4f3d33106cbdd711-FRA
link
<https://medium.com/humans.txt>; rel="humans"
expires
Thu, 09 Sep 1999 09:09:09 GMT
branch-latest.min.js
cdn.branch.io/
71 KB
22 KB
Script
General
Full URL
https://cdn.branch.io/branch-latest.min.js
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.202.112 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-202-112.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
7dd53c9f4022497aac7ecf8d6a0ebfa2fc526abbab78cc75cf1208d68e23d2de

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
_2yNbHoDdJl88diLu0eVspnFZA.PKrN8
Content-Encoding
gzip
Last-Modified
Wed, 03 Jul 2019 20:20:16 GMT
Server
AmazonS3
Age
298
ETag
"d2a32b0f1227899ef6229ee333171dc2"
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 7b48191d48ad0a2b3616c20acd7fbc1c.cloudfront.net (CloudFront)
Cache-Control
max-age=300
Date
Tue, 09 Jul 2019 20:50:42 GMT
X-Amz-Cf-Pop
FRA50
Connection
keep-alive
Content-Length
21684
X-Amz-Cf-Id
0o4spScTN7gjBN4ZGx7aU23dy9jqjsIgQhuxFY86tDzY8ajlU3o7bA==
0*ru4HReHN1pn26RBp.
cdn-images-1.medium.com/fit/c/36/36/
1 KB
2 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/36/36/0*ru4HReHN1pn26RBp.
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
52a4e1749250ac25a89ebda9ce2466c03f81917a9e42ad25261e1b60dee28929
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
x-content-type-options
nosniff
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3196-7da812a
status
200
content-length
1467
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, must-revalidate, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d3312ee57d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:33 UTC
placements
medium.com/_/api/
0
149 B
XHR
General
Full URL
https://medium.com/_/api/placements?requestContext%5BpostPageContext%5D%5BpostId%5D=14f9142b063d&requestContext%5BcontextType%5D=postPageContext&slots%5B0%5D%5Blocation%5D=1&slots%5B0%5D%5Bindex%5D=0
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Access-Control-Request-Method
GET
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,x-client-date,x-obvious-cid,x-opentracing,x-xsrf-token

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
204
access-control-max-age
86400
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
access-control-allow-headers
Accept, Content-Type, Origin, User-Agent, DNT, Cache-Control, X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, x-opentracing
x-obvious-tid
1562705733647:8987588d2d24
server
cloudflare
x-frame-options
sameorigin
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
access-control-allow-methods
GET, POST, PUT, DELETE
access-control-allow-origin
https://hackernoon.com
cache-control
no-cache
access-control-allow-credentials
true
content-security-policy
default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://medium.com https://*.medium.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
cf-ray
4f3d3312fc0ad70d-FRA
link
<https://medium.com/humans.txt>; rel="humans"
reports
collector-medium.lightstep.com/api/v0/
0
174 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,lightstep-access-token

Response headers

status
200
date
Tue, 09 Jul 2019 20:55:33 GMT
access-control-allow-credentials
true
access-control-allow-origin
*
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
0
access-control-allow-methods
POST
reports
collector-medium.lightstep.com/api/v0/
113 B
311 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
2ea66af114fc3cd8cd5c1d5bffca3c590bb68945738214190132e3f3acbf1a37

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Origin
https://hackernoon.com
LightStep-Access-Token
ce5be895bef60919541332990ac9fef2
Content-Type
application/json

Response headers

date
Tue, 09 Jul 2019 20:55:33 GMT
status
200
access-control-allow-methods
POST
content-type
application/json
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
113
placements
medium.com/_/api/
185 KB
40 KB
XHR
General
Full URL
https://medium.com/_/api/placements?requestContext%5BpostPageContext%5D%5BpostId%5D=14f9142b063d&requestContext%5BcontextType%5D=postPageContext&slots%5B0%5D%5Blocation%5D=1&slots%5B0%5D%5Bindex%5D=0
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:787f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Medium
Resource Hash
8d1d57986fc70b7bda188207abf9a4b9710672be6fb07be92ca51e1f47b686f2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

X-Client-Date
1562705733590
Origin
https://hackernoon.com
X-XSRF-Token
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json
X-Obvious-CID
web
Accept
application/json
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
x-opentracing
{"ot-tracer-spanid":"567951468fb3d","ot-tracer-traceid":"1ee577f317c1a8","ot-tracer-sampled":"true"}

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
200
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
pragma
no-cache
x-obvious-tid
1562705733800:dd457767e0ab
server
cloudflare
x-frame-options
sameorigin
tk
T
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=utf-8
access-control-allow-origin
https://hackernoon.com
access-control-expose-headers
X-Xsrf-Token, X-Obvious-Cid, X-Client-Date, X-Obvious-Profiling, X-Diagnostics, x-opentracing
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
cf-ray
4f3d3313ced7d711-FRA
link
<https://medium.com/humans.txt>; rel="humans"
expires
Thu, 09 Sep 1999 09:09:09 GMT
reports
collector-medium.lightstep.com/api/v0/
0
174 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,lightstep-access-token

Response headers

status
200
date
Tue, 09 Jul 2019 20:55:34 GMT
access-control-allow-credentials
true
access-control-allow-origin
*
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
0
access-control-allow-methods
POST
reports
collector-medium.lightstep.com/api/v0/
113 B
311 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
13d4c2baf994bc8e838c785c838f5a735b725949b44c160677197231c2fa6841

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Origin
https://hackernoon.com
LightStep-Access-Token
ce5be895bef60919541332990ac9fef2
Content-Type
application/json

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
status
200
access-control-allow-methods
POST
content-type
application/json
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
113
1*N1Z7xSIyyO52Q7DlKRgMwQ.jpeg
cdn-images-1.medium.com/fit/c/36/36/
2 KB
2 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/36/36/1*N1Z7xSIyyO52Q7DlKRgMwQ.jpeg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
10c5fd8ea80bfe5e142ac5beae217657d31decfdf5a9f9c168af8f15e3bb0695
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
1244849
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3196-7da812a
status
200
vary
Accept-Encoding
content-length
1793
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d33183805d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:34 GMT
2*Mv-mHaSQ4kdlZf0WM4T2yg.jpeg
cdn-images-1.medium.com/fit/c/36/36/
2 KB
2 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/36/36/2*Mv-mHaSQ4kdlZf0WM4T2yg.jpeg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
9f98638be2fcde94e0693672eaa0416af2f3e95e56a47204181be4e80a2d6c92
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
877450
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3196-7da812a
status
200
vary
Accept-Encoding
content-length
1536
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d33183809d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:34 GMT
1*IL0mnvzNcpG2ZD0JBqo7zQ.jpeg
cdn-images-1.medium.com/fit/c/36/36/
1 KB
1 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/36/36/1*IL0mnvzNcpG2ZD0JBqo7zQ.jpeg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
9bd3d2347b7374ec78061429df9339668f422d5091410db6168143e190333019
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
1779000
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3192-d9ea9bb
status
200
vary
Accept-Encoding
content-length
1312
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d3318380dd6bd-FRA
expires
Thu, 08 Aug 2019 20:55:34 GMT
1*NCTCiMU_5o6EgFKUp90wUA.jpeg
cdn-images-1.medium.com/fit/c/400/120/
19 KB
19 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/400/120/1*NCTCiMU_5o6EgFKUp90wUA.jpeg
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
b71f59a86631982cb26deea1799143941fbbef3e2092b24ffa9f52b5a68130b2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
1167425
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3196-7da812a
status
200
vary
Accept-Encoding
content-length
19585
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d3318380fd6bd-FRA
expires
Thu, 08 Aug 2019 20:55:34 GMT
1*ZB9u_IEwlq-gUiF7AdZKPQ.png
cdn-images-1.medium.com/fit/c/400/120/
8 KB
8 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/400/120/1*ZB9u_IEwlq-gUiF7AdZKPQ.png
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
b45fabc2e71d0ebc5a082b68699710550ff5215243af8e90b2d874fa89ffc042
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
1169561
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3196-7da812a
status
200
vary
Accept-Encoding
content-length
7900
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d33183810d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:34 GMT
1*YO5HhWqmVtefTl_aXi5xKw.png
cdn-images-1.medium.com/fit/c/400/120/
71 KB
71 KB
Image
General
Full URL
https://cdn-images-1.medium.com/fit/c/400/120/1*YO5HhWqmVtefTl_aXi5xKw.png
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Geomyidae artificij
Resource Hash
8f21f7d5c642d5fa172f89269df0200f896bbf583c8da6bab0b467b226642915
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
1537303
x-powered-by
Geomyidae artificij
x-obvious-info
16.3, 3196-7da812a
status
200
vary
Accept-Encoding
content-length
72644
pragma
public
server
cloudflare
etag
"16.3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
cf-ray
4f3d33183811d6bd-FRA
expires
Thu, 08 Aug 2019 20:55:34 GMT
marat-sans-600-normal.woff
glyph.medium.com/font/6f4b679/3k-4f_4h-6bt_6bv-6c3_6c5-6c7_6ca-6cb_6ce-6ch_6cj-6cl_6cn-nvnj/
15 KB
15 KB
Font
General
Full URL
https://glyph.medium.com/font/6f4b679/3k-4f_4h-6bt_6bv-6c3_6c5-6c7_6ca-6cb_6ce-6ch_6cj-6cl_6cn-nvnj/marat-sans-600-normal.woff
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7691 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cb31d2d43efc714642919af84920177170837267c64a8fd3cec95889f83cc276
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://glyph.medium.com/css/e/sr/latin/e/ssr/latin/e/ssb/latin/m2.css
Origin
https://hackernoon.com

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
11981177
status
200
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
86400
access-control-allow-methods
GET, POST, PUT, DELETE
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
access-control-allow-credentials
true
cf-ray
4f3d33182fbbd6bd-FRA
access-control-allow-headers
Accept, Cache-Control, Content-Type, Cookie, DNT, Origin, User-Agent, X-Client-Date, X-Obvious-Cid, X-Opentracing, X-Xsrf-Token, ot-tracer-sampled, ot-tracer-spanid, ot-tracer-traceid
expires
Wed, 08 Jul 2020 20:55:34 GMT
reports
collector-medium.lightstep.com/api/v0/
0
174 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,lightstep-access-token

Response headers

status
200
date
Tue, 09 Jul 2019 20:55:34 GMT
access-control-allow-credentials
true
access-control-allow-origin
*
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
0
access-control-allow-methods
POST
reports
collector-medium.lightstep.com/api/v0/
113 B
311 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
c346208596602053d74afefe82dfc61a1f662337b57968a568275e819dd4bd5c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Origin
https://hackernoon.com
LightStep-Access-Token
ce5be895bef60919541332990ac9fef2
Content-Type
application/json

Response headers

date
Tue, 09 Jul 2019 20:55:34 GMT
status
200
access-control-allow-methods
POST
content-type
application/json
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
113
_r
app.link/
90 B
724 B
Script
General
Full URL
https://app.link/_r?sdk=web2.50.1&branch_key=key_live_ofxXr2qTrrU9NqURK8ZwEhknBxiI6KBm&callback=branch_callback__0
Requested by
Host: cdn.branch.io
URL: https://cdn.branch.io/branch-latest.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:c200:19:9934:6a80:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
openresty/1.13.6.2 / Express
Resource Hash
c48f82c8ed42ac34a71eb806385c0925c86a32c27b19faba3be719943bdd6542
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 09 Jul 2019 20:55:36 GMT
Via
1.1 c2890b1d84d781704a34b9aa5c069d4e.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Server
openresty/1.13.6.2
X-Amz-Cf-Pop
FRA50
X-Powered-By
Express
X-Cache
Miss from cloudfront
Content-Type
text/javascript; charset=utf-8
Connection
keep-alive
Content-Length
90
ETag
W/"5a-ofJPXwQ6836fkGLk2Z+on7t9RlI"
X-Amz-Cf-Id
wjts4Ja3NQeKn0ymkTI0mb0zvLbjBOUKcc_WsZwOiKQpJmziUNYyaQ==
open
api2.branch.io/v1/
312 B
596 B
XHR
General
Full URL
https://api2.branch.io/v1/open
Requested by
Host: cdn.branch.io
URL: https://cdn.branch.io/branch-latest.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:2800:11:f728:3040:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
openresty/1.13.6.2 /
Resource Hash
c14bd8730091474e35cb1087b846c54115b1bdc9f1db09ba9a2dd264f511eb8a

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Origin
https://hackernoon.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Tue, 09 Jul 2019 20:55:36 GMT
via
1.1 fe87e98f55ed12d46a06c407f072a87e.cloudfront.net (CloudFront)
server
openresty/1.13.6.2
x-amz-cf-pop
FRA50
status
200
x-cache
Miss from cloudfront
content-type
application/json
access-control-allow-origin
*
cache-control
no-cache
content-length
312
x-amz-cf-id
nPt-20ooQm2VDW2x1SHTsI7562xdtH4GU7Kkvw5xs5WvRb63miPEOQ==
pageview
api2.branch.io/v1/
28 B
359 B
XHR
General
Full URL
https://api2.branch.io/v1/pageview
Requested by
Host: cdn.branch.io
URL: https://cdn.branch.io/branch-latest.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:2800:11:f728:3040:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
openresty/1.13.6.2 / Express
Resource Hash
a82dc28d43942326b346f92907df3bea5e38b2325ef97176f3b6234966bf19eb

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Origin
https://hackernoon.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Tue, 09 Jul 2019 20:55:37 GMT
via
1.1 fe87e98f55ed12d46a06c407f072a87e.cloudfront.net (CloudFront)
server
openresty/1.13.6.2
x-amz-cf-pop
FRA50
x-powered-by
Express
etag
W/"1c-KRZWpHfIKyIHGKJ9mp9lAyX+vFY"
status
200
x-cache
Miss from cloudfront
content-type
application/json; charset=utf-8
access-control-allow-origin
*
content-length
28
x-amz-cf-id
z3Z10T0OgZSqSY4AGn7sLKCJNb4FNAE3bzg12CVAUefBvatX53uFYA==
batch
hackernoon.com/_/
115 B
1 KB
XHR
General
Full URL
https://hackernoon.com/_/batch
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.4.145.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-145-119.compute-1.amazonaws.com
Software
nginx / Medium
Resource Hash
95a8164a5023f6a90a1d61270d4c56adce077119189f76e33f0b72d5ae226cd7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

X-Client-Date
1562705737394
Origin
https://hackernoon.com
X-XSRF-Token
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/json
Accept
application/json
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
X-Obvious-CID
web

Response headers

date
Tue, 09 Jul 2019 20:55:37 GMT
x-content-type-options
nosniff
x-powered-by
Medium
x-obvious-info
38056-9b4ddcc,9b4ddcc152c
status
409
content-length
115
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge, Chrome=1
pragma
no-cache
link
<https://medium.com/humans.txt>; rel="humans"
x-obvious-tid
1562705737430:40e90ca1ea7f
server
nginx
x-frame-options
sameorigin
content-type
application/json; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
x-opentracing
{"ot-tracer-spanid":"3eb1750225f1a151","ot-tracer-traceid":"3a9c53f87dc2beda","ot-tracer-sampled":"true"}
expires
Thu, 09 Sep 1999 09:09:09 GMT
reports
collector-medium.lightstep.com/api/v0/
0
174 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: cdn-static-1.medium.com
URL: https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.qglyov-OBtPQmx8Ye5S9wg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://hackernoon.com
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,lightstep-access-token

Response headers

status
200
date
Tue, 09 Jul 2019 20:55:37 GMT
access-control-allow-credentials
true
access-control-allow-origin
*
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
0
access-control-allow-methods
POST
reports
collector-medium.lightstep.com/api/v0/
113 B
311 B
XHR
General
Full URL
https://collector-medium.lightstep.com/api/v0/reports
Requested by
Host: hackernoon.com
URL: https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.23.71.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-23-71-11.compute-1.amazonaws.com
Software
/
Resource Hash
deb3c75d81908efca1bb07584cf33f76b583114861c057be5e2df3bed29b64cd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
Origin
https://hackernoon.com
LightStep-Access-Token
ce5be895bef60919541332990ac9fef2
Content-Type
application/json

Response headers

date
Tue, 09 Jul 2019 20:55:37 GMT
status
200
access-control-allow-methods
POST
content-type
application/json
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-headers
LightStep-Access-Token, Content-Type
content-length
113
/
srv-2019-07-09-20.pixel.parsely.com/start/
77 B
380 B
Script
General
Full URL
https://srv-2019-07-09-20.pixel.parsely.com/start/?rand=1562705743949&plid=90904536&idsite=medium.com&url=https%3A%2F%2Fhackernoon.com%2Fdeauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%7D&sid=1&surl=https%3A%2F%2Fhackernoon.com%2Fdeauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d&sref=&sts=1562705743948&slts=0&date=Tue+Jul+09+2019+22%3A55%3A43+GMT%2B0200+(Central+European+Summer+Time)&action=heartbeat&inc=5&tt=4901&callback=parselyStartCallback
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/keys/medium.com/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.216.32.87 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-216-32-87.compute-1.amazonaws.com
Software
nginx /
Resource Hash
10e53e2d8057965d7c2260ca7b18281a301967ca30a2a201809a159bc1f25955

Request headers

Referer
https://hackernoon.com/deauthentication-attack-and-other-wifi-hacks-using-an-esp8266-module-14f9142b063d
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 09 Jul 2019 20:55:44 GMT
Server
nginx
Connection
keep-alive
Content-Type
application/json
Content-Length
77
P3P
CP="CUR ADM OUR NOR STA NID"

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
i.embed.ly
URL
https://i.embed.ly/1/display/resize?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fr5aoV5AolNo%2Fhqdefault.jpg&key=a19fcc184b9711e1b4764040d3dc5c07&width=40
Domain
i.embed.ly
URL
https://i.embed.ly/1/display/resize?url=https%3A%2F%2Fucarecdn.com%2F57662ddc-da7c-407b-afcb-cb45184b2705%2F&key=4fce0568f2ce49e8b54624ef71a8a5bd&width=40

Verdicts & Comments Add Verdict or Comment

25 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| perfMetrics number| OB_startTime object| OB_loadErrors function| _onerror function| _asyncScript function| _asyncStyles function| ga function| obvInit object| GLOBALS object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| _mdm object| PLOVR_MODULE_INFO object| PLOVR_MODULE_URIS boolean| PLOVR_MODULE_USE_DEBUG_MODE function| _resizeIframe object| PARSELY object| __obv object| branch function| parselyStartCallback

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'; connect-src https://localhost https://*.instapaper.com https://*.stripe.com https://glyph.medium.com https://*.paypal.com https://getpocket.com https://hackernoon.com https://*.hackernoon.com https://*.medium.com https://medium.com https://*.medium.com https://*.algolia.net https://cdn-static-1.medium.com https://dnqgz544uhbo8.cloudfront.net https://cdn-videos-1.medium.com https://cdn-audio-1.medium.com https://*.lightstep.com https://*.branch.io https://app.zencoder.com 'self'; font-src data: https://*.amazonaws.com https://*.medium.com https://glyph.medium.com https://medium.com https://*.gstatic.com https://dnqgz544uhbo8.cloudfront.net https://use.typekit.net https://cdn-static-1.medium.com 'self'; frame-src chromenull: https: webviewprogressproxy: medium: 'self'; img-src blob: data: https: 'self'; media-src https://*.cdn.vine.co https://d1fcbxp97j4nb2.cloudfront.net https://d262ilb51hltx0.cloudfront.net https://*.medium.com https://gomiro.medium.com https://miro.medium.com https://pbs.twimg.com 'self' blob:; object-src 'self'; script-src 'unsafe-eval' 'unsafe-inline' about: https: 'self'; style-src 'unsafe-inline' data: https: 'self'; report-uri https://csp.medium.com
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

api2.branch.io
app.link
cdn-images-1.medium.com
cdn-static-1.medium.com
cdn.branch.io
collector-medium.lightstep.com
d1z2jf7jlzjs58.cloudfront.net
glyph.medium.com
hackernoon.com
i.embed.ly
medium.com
srv-2019-07-09-20.pixel.parsely.com
stats.g.doubleclick.net
www.google-analytics.com
i.embed.ly
23.23.71.11
2600:9000:200d:2800:11:f728:3040:93a1
2600:9000:200d:c200:19:9934:6a80:93a1
2606:4700::6810:7691
2606:4700::6810:787f
2a00:1450:4001:820::200e
2a00:1450:400c:c0c::9c
3.216.32.87
52.4.145.119
52.85.182.60
54.230.202.112
03c2ae6c856da96c7b20fc1296e3617de1e895505ea6d6f1b2b3a62e0c9712a7
087a4c7aa118304c5ce85d5917d95a49b3c93204ef3500752dfde52595e4eac6
0d95ff7e27cd4177b0b91c7b1163154e5f73ee0d1c4c13dc59c0362119b6eb12
10c5fd8ea80bfe5e142ac5beae217657d31decfdf5a9f9c168af8f15e3bb0695
10e53e2d8057965d7c2260ca7b18281a301967ca30a2a201809a159bc1f25955
12fe85ec038af8c41ba830412520589dbd125d417913c10a57838ac92ab96192
13d4c2baf994bc8e838c785c838f5a735b725949b44c160677197231c2fa6841
14d841edb82a1c3df55fd22150398289fe15a206e5ba1ea2b9864d772870a700
1d9cf260857ba919d4a08e9ed8243affd04714525ea1eab276db29df9c0cd3f2
24d3bbd5ba802c327e8e857400176235959ef97c90bbe2e840c1afe2da64c9ad
29a0ecc696d7fecf3487770bbb570844ebea2b540a33764482b1e2520418d6c9
2ea66af114fc3cd8cd5c1d5bffca3c590bb68945738214190132e3f3acbf1a37
2ec3f1be2d2113c8735e56370fd02cd5171467e03711eb3aa73685991657a8c0
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49
52a4e1749250ac25a89ebda9ce2466c03f81917a9e42ad25261e1b60dee28929
578a87e570e5c11ba11bf488c0ccf35da147b64599926991c5c22296ead82237
62daadf28861f33e56ec9e7dfbfa6948a5ac33f0cbf00eed6640692e6df7a83a
6f8c1ebdb0bdb82d44043c44ba8c495dc6c1e0d81f3d0f906a91d4135a1d0fb9
70a71e247c9de93233ddac3ccea8c9ded1e1cf86d8241fa981feb3598c3c3bee
7dd53c9f4022497aac7ecf8d6a0ebfa2fc526abbab78cc75cf1208d68e23d2de
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
8d1d57986fc70b7bda188207abf9a4b9710672be6fb07be92ca51e1f47b686f2
8f21f7d5c642d5fa172f89269df0200f896bbf583c8da6bab0b467b226642915
95a8164a5023f6a90a1d61270d4c56adce077119189f76e33f0b72d5ae226cd7
99c5448d6c84fc71d6805e2485727db250113edcaea123a064f8c26ce95947d8
9bd3d2347b7374ec78061429df9339668f422d5091410db6168143e190333019
9f98638be2fcde94e0693672eaa0416af2f3e95e56a47204181be4e80a2d6c92
a1a9f0f2844d80ca5a41f2d483d56d674eb333e570706b935cf46add6aa2f31d
a2d55ce06c19987087d633dccd84682fda6476cd4ae5c3c52710940673f33ca5
a391a7ab63daf0bd945659c7cd4ad77d6e5771de2f92ab2bbe71bf8caf5482a0
a3d669b687929b3aa777fdd2c400c2b8c6b794978536a64d7e1f71edcf8037e8
a4883cce814b6793c5bd6dd3639d6048ecab39a93a90b560d39a9fd0aff6e263
a5301513f8b8e40c8f57679e9f5b8b96ffd6f14ad11479480361cd361ec0466f
a82dc28d43942326b346f92907df3bea5e38b2325ef97176f3b6234966bf19eb
b45fabc2e71d0ebc5a082b68699710550ff5215243af8e90b2d874fa89ffc042
b71f59a86631982cb26deea1799143941fbbef3e2092b24ffa9f52b5a68130b2
baa50bc1fe62b42c0e6cd74881e5f615bdb4dec43e3aa64d1a6142729a5e79d7
c14bd8730091474e35cb1087b846c54115b1bdc9f1db09ba9a2dd264f511eb8a
c346208596602053d74afefe82dfc61a1f662337b57968a568275e819dd4bd5c
c48f82c8ed42ac34a71eb806385c0925c86a32c27b19faba3be719943bdd6542
c5820810892e6b9732140a8adead2ad4639849d01d0da6a4de3d3cbb9d5e92c0
cb31d2d43efc714642919af84920177170837267c64a8fd3cec95889f83cc276
deb3c75d81908efca1bb07584cf33f76b583114861c057be5e2df3bed29b64cd
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
edfd68cf67f6fa0bc76c6d0bbb59525f1dd397618d8ce3177ed10f3371c2d493
ef1ed6a034a5055a869c7c25765ee1f2844a27a54e83e8a857d77b3f1cd83dd3
f0b9a9e4ea994c106a4fc595828ca1332b2cd0435d5d159d26d1773344d97367
f4a9ee09672ea6b458040a67cdb6707eb25168dfee7db880abe28ba75b9ddf3a
f57137897a4e676f0d2199b79def1a95b253a1a938dff9d8ba10519f3beb2b08
fac2fe0825791af35822e4c8f6835635eb2cf8368b717594430a7c8d8925f188
fe6df6266fc048d0eaf630e316032bcc8790b69105c2e69c322d543d37eba83b
ff1ee3d7480c0a00fb98a8b5f6c257a508f36096daf66cb350ede907bf93f4f1