URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickro...
Submission: On January 21 via manual from ES

Summary

This website contacted 57 IPs in 8 countries across 37 domains to perform 357 HTTP transactions. The main IP is 52.222.155.166, located in Seattle, United States and belongs to AMAZON-02, US. The main domain is www.genbeta.com.
TLS certificate: Issued by Amazon on January 16th 2020. Valid for: a year.
This is the only time www.genbeta.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 52.222.155.166 16509 (AMAZON-02)
1 2600:9000:204... 16509 (AMAZON-02)
12 52.222.155.79 16509 (AMAZON-02)
19 2a00:1450:400... 15169 (GOOGLE)
3 21 23.45.99.242 20940 (AKAMAI-ASN1)
3 52.222.153.194 16509 (AMAZON-02)
2 2600:1901:0:7... 15169 (GOOGLE)
10 2a00:1450:400... 15169 (GOOGLE)
13 2a00:1450:400... 15169 (GOOGLE)
1 38 216.58.207.66 15169 (GOOGLE)
2 4 2a00:1450:400... 15169 (GOOGLE)
16 52.222.155.25 16509 (AMAZON-02)
1 2 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 58 51.89.99.150 16276 (OVH)
7 2606:2800:234... 15133 (EDGECAST)
2 2 2a00:1450:400... 15169 (GOOGLE)
3 4 2001:4860:480... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
2 2600:9000:204... 16509 (AMAZON-02)
1 178.33.230.6 16276 (OVH)
1 2 52.94.220.16 16509 (AMAZON-02)
3 2a03:2880:f02... 32934 (FACEBOOK)
1 192.0.77.2 2635 (AUTOMATTIC)
1 2 2a03:2880:f02... 32934 (FACEBOOK)
5 51.68.35.185 16276 (OVH)
2 51.91.154.17 16276 (OVH)
1 52.222.155.38 16509 (AMAZON-02)
4 52.222.155.197 16509 (AMAZON-02)
1 2a03:2880:f12... 32934 (FACEBOOK)
1 3 104.244.42.136 13414 (TWITTER)
1 2606:2800:134... 15133 (EDGECAST)
3 2606:2800:134... 15133 (EDGECAST)
18 2a00:1450:400... 15169 (GOOGLE)
4 159.69.76.252 24940 (HETZNER-AS)
2 2600:9000:204... 16509 (AMAZON-02)
2 2600:9000:204... 16509 (AMAZON-02)
3 185.94.180.124 35220 (SPOTX-AMS)
1 2a00:1450:400... 15169 (GOOGLE)
13 94.130.242.231 24940 (HETZNER-AS)
1 92.222.198.105 16276 (OVH)
5 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
4 2.16.186.105 20940 (AKAMAI-ASN1)
4 185.86.137.43 201081 (SMARTADSE...)
2 185.28.138.9 197541 (VIDEOPLAZ...)
22 2a00:1450:400... 15169 (GOOGLE)
8 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
1 23.210.249.164 16625 (AKAMAI-AS)
6 159.69.67.244 24940 (HETZNER-AS)
6 69.173.144.141 26667 (RUBICONPR...)
6 185.86.138.121 201081 (SMARTADSE...)
1 185.33.223.221 29990 (ASN-APPNEX)
2 68.232.35.16 15133 (EDGECAST)
2 2600:9000:204... 16509 (AMAZON-02)
2 37.252.173.27 29990 (ASN-APPNEX)
357 57
Apex Domain
Subdomains
Transfer
65 sunmedia.tv
platform.sunmedia.tv
static.sunmedia.tv
services.sunmedia.tv
track.sunmedia.tv
vast.sunmedia.tv
creatives.sunmedia.tv
558 KB
42 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
ff.doubleclick.net
googleads.g.doubleclick.net
694 KB
26 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
101 KB
23 googleapis.com
fonts.googleapis.com
imasdk.googleapis.com
848 KB
23 richaudience.com
sync.richaudience.com
s.richaudience.com
shb.richaudience.com
50 KB
21 blogs.es
i.blogs.es
ti.blogs.es
ab.blogs.es
1 MB
21 scorecardresearch.com
sb.scorecardresearch.com
17 KB
19 googletagservices.com
www.googletagservices.com
496 KB
16 google.com
adservice.google.com
www.google.com
2 KB
14 weblogssl.com
img.weblogssl.com
recommendations.weblogssl.com
416 KB
10 smartadserver.com
www8.smartadserver.com
prg.smartadserver.com
12 KB
10 twitter.com
platform.twitter.com
syndication.twitter.com
107 KB
8 ampproject.org
cdn.ampproject.org
137 KB
6 rubiconproject.com
fastlane.rubiconproject.com
10 KB
6 2mdn.net
s0.2mdn.net
62 KB
6 sascdn.com
ced.sascdn.com
ec.sascdn.com
61 KB
5 google.nl
adservice.google.nl
1 KB
5 amazon-adsystem.com
c.amazon-adsystem.com
aax-eu.amazon-adsystem.com
30 KB
4 agkn.com
js.agkn.com
d.agkn.com
7 KB
4 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
40 KB
4 facebook.com
graph.facebook.com
staticxx.facebook.com
www.facebook.com
1 KB
4 google-analytics.com
www.google-analytics.com
18 KB
4 google.de
adservice.google.de
www.google.de
567 B
3 adnxs.com
ib.adnxs.com
secure.adnxs.com
2 KB
3 spotxchange.com
search.spotxchange.com
4 KB
3 youtube.com
img.youtube.com
41 KB
3 privacy-center.org
sdk.privacy-center.org
sdk-gcp.privacy-center.org
115 KB
3 genbeta.com
www.genbeta.com
135 KB
2 digitru.st
prebid.digitru.st
2 KB
2 videoplaza.tv
es-sunelespanol.videoplaza.tv
9 KB
2 gravatar.com
www.gravatar.com
3 KB
1 casalemedia.com
as-sec.casalemedia.com
988 B
1 richmediastudio.com
rosetta.richmediastudio.com
2 KB
1 fbsbx.com
platform-lookaside.fbsbx.com
1 KB
1 wp.com
i0.wp.com
627 B
1 facebook.net
connect.facebook.net
57 KB
1 adserver.video
adserver.video
243 B
357 37
Domain Requested by
38 securepubads.g.doubleclick.net 1 redirects www.googletagservices.com
securepubads.g.doubleclick.net
www.genbeta.com
s.richaudience.com
22 imasdk.googleapis.com static.sunmedia.tv
imasdk.googleapis.com
22 static.sunmedia.tv www.genbeta.com
static.sunmedia.tv
creatives.sunmedia.tv
21 sb.scorecardresearch.com 3 redirects www.genbeta.com
s.richaudience.com
20 track.sunmedia.tv static.sunmedia.tv
creatives.sunmedia.tv
19 www.googletagservices.com www.genbeta.com
securepubads.g.doubleclick.net
18 tpc.googlesyndication.com securepubads.g.doubleclick.net
static.sunmedia.tv
www.genbeta.com
16 i.blogs.es www.genbeta.com
14 creatives.sunmedia.tv static.sunmedia.tv
creatives.sunmedia.tv
13 s.richaudience.com securepubads.g.doubleclick.net
s.richaudience.com
12 adservice.google.com www.googletagservices.com
securepubads.g.doubleclick.net
imasdk.googleapis.com
12 img.weblogssl.com www.genbeta.com
securepubads.g.doubleclick.net
platform.twitter.com
8 cdn.ampproject.org securepubads.g.doubleclick.net
8 pagead2.googlesyndication.com
7 platform.twitter.com www.genbeta.com
platform.twitter.com
6 prg.smartadserver.com www.genbeta.com
6 fastlane.rubiconproject.com www.genbeta.com
6 shb.richaudience.com www.genbeta.com
6 s0.2mdn.net imasdk.googleapis.com
6 vast.sunmedia.tv static.sunmedia.tv
5 adservice.google.nl securepubads.g.doubleclick.net
4 www8.smartadserver.com ced.sascdn.com
4 ced.sascdn.com creatives.sunmedia.tv
4 sync.richaudience.com www.genbeta.com
sync.richaudience.com
4 ab.blogs.es www.genbeta.com
4 www.google.com 3 redirects www.genbeta.com
4 www.google-analytics.com 2 redirects www.genbeta.com
3 search.spotxchange.com static.sunmedia.tv
3 pbs.twimg.com www.genbeta.com
3 syndication.twitter.com 1 redirects www.genbeta.com
3 img.youtube.com www.genbeta.com
3 c.amazon-adsystem.com www.genbeta.com
c.amazon-adsystem.com
3 www.genbeta.com www.genbeta.com
2 secure.adnxs.com static.sunmedia.tv
2 prebid.digitru.st creatives.sunmedia.tv
2 ec.sascdn.com creatives.sunmedia.tv
2 es-sunelespanol.videoplaza.tv static.sunmedia.tv
2 d.agkn.com js.agkn.com
2 js.agkn.com www.genbeta.com
2 services.sunmedia.tv static.sunmedia.tv
2 graph.facebook.com 1 redirects connect.facebook.net
2 aax-eu.amazon-adsystem.com 1 redirects c.amazon-adsystem.com
2 recommendations.weblogssl.com www.genbeta.com
2 www.google.de www.genbeta.com
2 stats.g.doubleclick.net 2 redirects
2 www.gravatar.com 1 redirects www.genbeta.com
2 adservice.google.de www.googletagservices.com
2 sdk-gcp.privacy-center.org sdk.privacy-center.org
sdk-gcp.privacy-center.org
1 ib.adnxs.com www.genbeta.com
1 as-sec.casalemedia.com www.genbeta.com
1 googleads.g.doubleclick.net www.genbeta.com
1 ff.doubleclick.net securepubads.g.doubleclick.net
1 rosetta.richmediastudio.com s.richaudience.com
1 fonts.googleapis.com
1 cdn.syndication.twimg.com platform.twitter.com
1 www.facebook.com connect.facebook.net
1 staticxx.facebook.com connect.facebook.net
1 ti.blogs.es www.genbeta.com
1 platform-lookaside.fbsbx.com www.genbeta.com
1 i0.wp.com www.genbeta.com
1 connect.facebook.net img.weblogssl.com
1 adserver.video www.genbeta.com
1 platform.sunmedia.tv 1 redirects
1 sdk.privacy-center.org www.genbeta.com
357 64
Subject Issuer Validity Valid
*.applesfera.com
Amazon
2020-01-16 -
2021-02-16
a year crt.sh
*.privacy-center.org
Amazon
2019-05-22 -
2020-06-22
a year crt.sh
merodeando.com
Amazon
2019-07-04 -
2020-08-04
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.scorecardresearch.com
Sectigo RSA Organization Validation Secure Server CA
2019-12-16 -
2020-12-25
a year crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
sdk-gcp.privacy-center.org
Let's Encrypt Authority X3
2020-01-03 -
2020-04-02
3 months crt.sh
*.google.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.blogs.es
Amazon
2019-04-03 -
2020-05-03
a year crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.sunmedia.tv
COMODO RSA Domain Validation Secure Server CA
2018-01-19 -
2021-01-18
3 years crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
www.google.de
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
adserver.video
Let's Encrypt Authority X3
2018-11-29 -
2019-02-27
3 months crt.sh
aax-eu.amazon-adsystem.com
Amazon
2019-09-18 -
2020-08-26
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.richaudience.com
RapidSSL RSA CA 2018
2019-03-07 -
2021-04-05
2 years crt.sh
*.agkn.com
RapidSSL RSA CA 2018
2018-06-21 -
2020-09-16
2 years crt.sh
*.spotxchange.com
GeoTrust RSA CA 2018
2019-03-18 -
2021-03-17
2 years crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.richmediastudio.com
RapidSSL RSA CA 2018
2018-04-04 -
2020-04-03
2 years crt.sh
*.doubleclick.net
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
*.sascdn.com
DigiCert SHA2 Secure Server CA
2019-10-17 -
2020-10-16
a year crt.sh
*.smartadserver.com
Thawte RSA CA 2018
2018-09-07 -
2020-02-17
a year crt.sh
*.videoplaza.com
Let's Encrypt Authority X3
2019-11-27 -
2020-02-25
3 months crt.sh
misc-sni.google.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
www.google.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
cdn-cf.digitru.st
Amazon
2019-05-21 -
2020-06-21
a year crt.sh

This page contains 54 frames:

Primary Page: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Frame ID: 0A820BDCC66443979B10C6AAD61F59EA
Requests: 169 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html?origin=https%3A%2F%2Fwww.genbeta.com
Frame ID: D3C28B18E9E8E16BFF3343BDEB20E375
Requests: 1 HTTP requests in this frame

Frame: https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Frame ID: 221E66A3E0C3BE255F77AC17907E7712
Requests: 1 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter.php?version=45
Frame ID: B40A5521F14BCF61A78B6BF0B64C7CB3
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 216A253CBF213E60F1481E60665AF539
Requests: 1 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=812341093&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Technolgy%20%26amp%3B%20Computer%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 9760ADF00CAD5DFD84E2A0E30BC6AAA7
Requests: 1 HTTP requests in this frame

Frame: https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=331018&pubconsent=1&euconsent=1&hasConsent=1
Frame ID: 1CFEBC5778C49FFC9109D7628E4F7F83
Requests: 1 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Frame ID: C58DA82D7A24E1AC5B534734500606BF
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss-vebMxTWyoePlO3fZ9WblknXkgUQJVZ3jkgsgDz84cmsqt9PdWpDP-u2gu-IL0RcwnGxEsvaDhX9oBwGiDqPctvKCQpbWfMvJNdr8t5fy7FE2uqxyasS6My3APBoeaPqa5IdeuW4v3LC-kZoyLASUegcaBAZS8pGRFGliVZsOp7cu263BaSvaVoTuhtbZy6MU_ZCohbcQc8iNRNviMKdJ1lbhk46fdXNOZ2oBS0PmxkziQSsUwErEg-SGmiq68E8h2HkaQf7XSTCYMg&sai=AMfl-YSj5wCEbJ2349wvVXaKMm_mXx8_25p_Wre1YOaalROEWTClV8r5l8t8Nj8botQqeMvgJf_n6WkB-89E9Wtk0JP-0mBqquj7gapTjAJh&sig=Cg0ArKJSzG_U_RZnNV5qEAE&urlfix=1&adurl=
Frame ID: 24A7F72F09BBD683733ADD674949EF9D
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv9lJkhMKjRcfeMFYp5v2XsI4Re67AFbZCLxosAbVTGgPl-cgSjhi-5Dk-bYJ6WhTLrMdS0E5yNzZ8cyu20MIjLOKGfwC0-fxNE2-9ckRN20lkTmpi98qgCQujzJUlrFiNceYiLRSy8MEqD5HMkXgk8vPZnwbeEFs_y2g7FSyJxrnaxQEUo0CKz_x7fvQe3EueBFPDsALLZKgM2g3Ryjtwe12DL6otdYcYHljULetePVvUVqYMp5pSo0jF8tP72h20S9yK-WTab9u6VGQ&sai=AMfl-YSxIzMN3DIWR_nTt1hLvAJ3YoWPyFNCW9XqmId3D6Us4TDeXSqdbYWoCUDFHMH9p8wMgw1vNoNbdmU95bMasqLXyqcyUGZMyOEi38HH&sig=Cg0ArKJSzMIR5dZQEFfTEAE&urlfix=1&adurl=
Frame ID: B47003E1E308E312C7C4E6781A40BAD8
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstms3Xd-zLVqNwxAlhCiaq5h_d9xFQ9-quXcySOinHLM8iXqcPxOnkbVJjIU4WLT4i9ne3IF3sQUjY-95gDm2C8aEei8K-I8nc9bVzZBbqFbvykkOifm08lqIjGoO40cg5W14-LiGIxBwm5DGKK33bJd-pGwQyp2ZfWrV9NUZ1n3dqPkh1LaEtWn8w4sPkzAdLLhXznAc8WuyX7q8IxR2csWAMFl-ts4BppXcY6melRPFBtnVcDoDDnd1MGpNBdIWBeU0FyYwVI4JP7Iw&sai=AMfl-YRHYzTvyDmsvpFeFa6Nlksq4ZGjOnUD-QCEvNPyPn6yk3vXXjUyVEfthi1NxSoA9u4965jGTWKiuZC3XIORJiwJHHBGaaXT5T69EEz0&sig=Cg0ArKJSzGoaSUEHZbtGEAE&urlfix=1&adurl=
Frame ID: 463C5A81BEE934F23B915CAF1229EC98
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsveLj7yQAQTZeTHTwRAPJpkamKLTr9Ucyw0D7yR35rk8X-Cq2Kh25H9TmSafZ22r7o0BPaJv3PTOEqXlf92Us4x1hdp66G10OHUzzMBx3-q1smrLBNHryv7kdhma0OyWKAa5kJNCQaIncmc6TlbXNvTldjuNHBvVwTNmZG5bR0kzCe_w4Kas5KyWvI2WRiEcQ-kwWdsT1g6VlDIf-brVk4uiHv-9UJbdWgV75Pox3D9dT01B2EOa-oZRUNGWBEp-0OhVOB04zFgb8jAcdg&sai=AMfl-YR9LrNchXpJftA3cGt1oLlB2vBzCB1M7MMWSwXoW0ZhMx-3htdRKnN6OpWusx4iZE60yx9wZ3UnnTM2PvMTb4e1ORXjEZz-sc26G5PU&sig=Cg0ArKJSzBAI_ndLsGsVEAE&urlfix=1&adurl=
Frame ID: 4E135340D56DC196D69BB72FF030FA0E
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssNJfC-3-rJZEQDAxegu9k1LDN41KCxXN38NMNnllYikUlZBTV9iEd6OGoP7eG4FPjEiVDa-EhIYy7T67Vui_oNX8W-lNq7JJIXQbga7fADsYq6gC7D9AZgJ-TaxvRpRGs36J-NvWolIeVSHrEUCuYZfAWVaTZL7wxt5xE9nsYHzvwJ46yFeGWI10Eq3Jp6_q7YY_Pk-mcTEgFehrXeWrpmo8ILgUHnQQPWGEJTPX6DTUQajQZce3Fm1TCMEtoeAh8lCvikIjyOoGCEaA&sai=AMfl-YQY1gxqBz-yXwmtNULSxyZib-ZfUkTkLOhT2sARe4PggfvXPKvqbUe6XFaoccYnt6r4Zck5NjQIGcmb8_rInJhlRoRsDwThS5DqnSQ9&sig=Cg0ArKJSzAGyEXBgaDZBEAE&urlfix=1&adurl=
Frame ID: B0487EF9D68132474DD65EA5E9B7A691
Requests: 4 HTTP requests in this frame

Frame: data://truncated
Frame ID: 5C5F366955B7EE84FE3F2EEE476C26EA
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssQ-176TvoXIMHCApXabaEP7tS6t0GH-ox05ajFMzky2LHe_LUDWqZX6tMSng7Gly784BwglBmS1dXAxg3q32RnitznAcOisRlOO54uPtp37Twe4zIqfqui4wVJh18BVoFkwZn4mDzDePOGSP3ENNrs8qHsvkfJ47CJHKs7iDYW6GxiVUV1fcxaj5D2rjqOmpbkZU2UoQbjQnaRsjmcVHsvBLwdRPyEI5auyh7l2GpeMNcMZ-EzmmAVJ1AYPKBDx7vuU750_9_kAkY&sai=AMfl-YRNY2kUUh4wrLBxtWF2CYrL8dLAH9ytLFddL1zVZIbUMzlweNmleZUNxwUkHFxjgHEcxO5kqW7W3eZlMTRS7QAxxZ9BvFeuq5HFBCAY&sig=Cg0ArKJSzKWFWj8DFDmvEAE&urlfix=1&adurl=
Frame ID: 1A7E347EC07C21A8CBF142D0613743D0
Requests: 4 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: BA4E609F9215A81411D4188043183ED6
Requests: 10 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: 66530E5DFE4D9CE7D68BE742A5591B54
Requests: 11 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: E52D7B6ED3D47F7E962DBC8E325CC43C
Requests: 11 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: 09B076B3E9AA1915C54A20F1931CFED4
Requests: 12 HTTP requests in this frame

Frame: https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Frame ID: 37A9E5243BB7B88BF11DB180E8CA8940
Requests: 11 HTTP requests in this frame

Frame: https://ff.doubleclick.net/tag/js/fetch_frame_2020011301.html
Frame ID: FB225FB2F06FB86D94FB57F483D93745
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvJIvT56ZJTYRVCmRp4weJOGN4QnkcC9V1WWC3n9xuGakJEvyzO9TJvnFJZqeyKelsWEdwj8ugOLMWvBFj69WbP5ySmGwHuWlTUzqAjS57_PpvW3MqKyzqzH4YMfoK0bR4oErODMVspFrC3emrROG_UxEQpxv0GXlgplSlb5NEBnQy4hAV_4Q2fWfcLZy_jGK56zVqlV1gSi_jVUoz1qkQDQYWnKi8WvKHSC-YWtmhJ0dniNyPaK9N1xp16sVepS5Nb99Vg8g&sig=Cg0ArKJSzM3bs7D_1fZ_EAE&urlfix=1&adurl=
Frame ID: E94536FD9BD9FA897A963E4D8126CEC2
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv9lrwYPM5E6zevnpX36oCdK6tJ_nigEKmgYQNIGPV8MGaXhwqDo4z8OhjDT27pPYUj4g623QjTKw9CiTaOP2kXc9j_AIynfl8yDd5hjx9cIJwSU-FAU06KMiBIMadDNNshxxUG5N4Zimg9nXgY5hZ0QMc-QbBFMWoVBJKwFgfEiVuFS2YTLBUC7OEgvW1hB1F0XQgug2T5Atv5NEfLJYis9PYCjuhSRo9F6HZAmyKDpJzlKg6F7ZBDaMvtWmzzzxLkxH3rkA&sig=Cg0ArKJSzFwNnzx0rsilEAE&urlfix=1&adurl=
Frame ID: B5F5910A062D3B2814DFDD8011E2DFC9
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssXe16OCxkcmni0YmM12NsHENBVkpc-WZmZPgnuNajCJn-cGhcIJ0omgwr2_H6KmpnFMbVQWMbRCXS0DxZx1YsF1WWERpu_O50uqTJm_ySmkAsG4KdMu0FsuXy7LhPrvwpPhzDraFIsomSlurVEBcqwKsE8S2WNzZ7UXsSZUFM9Ms1upro00GWln7V6Ies_yuowvm-JAyggGki2T7WrzxOvfMgT_WVU3qrhNLPm6ff277r9OJWeH8pcf85xss6kqtQ9oizJ8Q&sig=Cg0ArKJSzPQTp_0vfSACEAE&urlfix=1&adurl=
Frame ID: AB86C87BFFACAD1ED56E9919D22AFDCE
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsveIA6z01Cu0McGViOiXYFInuk-uli9UIWo1NbAw1Hhu38nLvvirmKgTSnH1GoS_NF_0YwvYExkx9C9Be4-1gAP7FZkM8eaDkd-jTgosZqqyp2rOOzYqN76vSsxIPdefd0AYzebwp-gZAjHT4NH6f7grkGTNQTBhmoVrDpI1DBn6rtVc0A7c6IdS6mPZAF53h_YEVQfdgzWGH5JHtheQbZ-rIeSHPmTVCoKdRhk7tTM1ZXgYJMxxVPJA7aWhfeKQ87bYawDGA&sig=Cg0ArKJSzNfYreYVRuy-EAE&urlfix=1&adurl=
Frame ID: 6B1E5E95A28C09BB8C8714C327366544
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsupuVZ1HWnPOQ61g-BZCF05OgnADXUdxt6wiV3d7VbzfNOeuqwa-ae8PLHxITZkgWgaWCHXSBMBkuEBNULPPUBZq7bhT1PCPQpYvHHdwpaIQs-8DsKZNP96ustJ4TGB60nu6b6pOrdpCGk3o-p928maCclIKHL9mjiko7I5AiGUqgoiOgXmTQ91hZVq-j7bRtfBE-jhoRF4PIga7sPS_rEETaB0pc7ifrfUwx2hqzf1SmZ9smDngMjTa5Sto0SYx4LSMDEvYw&sig=Cg0ArKJSzMiXMNmdrqm_EAE&urlfix=1&adurl=
Frame ID: 4DD67B3E3ECDD90619C255021E852625
Requests: 10 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: 14DBCC58DEA20739C5EB1ABFCB33F157
Requests: 4 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: B3B3F44C8CA67333C5DC93D5BD890B49
Requests: 6 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js
Frame ID: 03F03887F2B6A6D83A5737C6342A431A
Requests: 12 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=430529686&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Business%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 6DC0C9B7F580198CA9F7F5C5D90989B5
Requests: 1 HTTP requests in this frame

Frame: https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=1208317&pubconsent=1&euconsent=1&hasConsent=1
Frame ID: 50F8DD69FCC003C4EB62FF20D67DE026
Requests: 1 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Frame ID: 718B8CD8885B67FF5A32323F00BA4DB3
Requests: 3 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: 4617DB1499DD5784244B5E36F0062301
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: 3EAB74D79565D8D2B75E6DAE910496E3
Requests: 6 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: E962CE076315796C47EEA0F24FA9099E
Requests: 4 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: 58ADA8D8820ED90DD72A9AF54FB05A2E
Requests: 6 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: 3A3343028F49A1838FE0AE8685A53B6B
Requests: 1 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Frame ID: FE53D471234957DC97F0163BBEF347C5
Requests: 3 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: 35F3A87250E1C5FFDAC96EDFE11FE5A9
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: 459D8122EB57B2A8F28102B079E89B14
Requests: 6 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: 8217F9E74486B03A115E312ECE2BB330
Requests: 4 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: CB08A695D4FF837C25D4AE755167D3EB
Requests: 1 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Frame ID: 4D76172B79080D45EC6881A401DD66E3
Requests: 4 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Frame ID: F39D485E42BBA324557922D95CA8B1D8
Requests: 3 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: B8C35A59B0BE26F1C3361C206D316471
Requests: 5 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: 68A5641470DB84EF5FDEDD45E6F011BC
Requests: 5 HTTP requests in this frame

Frame: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Frame ID: 88E76FDD8F04BCA38C61C9D1F2EF35BF
Requests: 3 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/live/ads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D/143394101/ca-video-pub-8221793852898543-tag/3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%26channel%3Dvastadp
Frame ID: 0733CC59CEEFA6BFA8AF732D298924DB
Requests: 6 HTTP requests in this frame

Frame: https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Frame ID: C444288140F7CAD7F2DBE710AFE8E7C7
Requests: 4 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: CC7B8501460E83926827FEBB501CAC10
Requests: 6 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: E4E8AC46D193BE1D2EBD41FE61B7312A
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Frame ID: 01F685A5C07F238AE915BFB5E4B1AEA1
Requests: 2 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Frame ID: D10B03D91FA6240972950042236C9AC5
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/live/ads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D/143394101/ca-video-pub-8221793852898543-tag/3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%26channel%3Dvastadp
Frame ID: 8132B714BF30A140F367CB64B5E6B261
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Page Statistics

357
Requests

100 %
HTTPS

49 %
IPv6

37
Domains

64
Subdomains

57
IPs

8
Countries

5312 kB
Transfer

14380 kB
Size

7
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 13
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035191&ns__t=1579615048905&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615048905&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 20
  • https://platform.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js HTTP 301
  • https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Request Chain 24
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1509052103&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&ul=en-us&de=UTF-8&dt=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=recommendationAmplify&ea=view&_u=aGDAAEABC~&jid=365454835&gjid=362079732&cid=133335796.1579615049&tid=UA-78515-6&_gid=973308409.1579615049&_r=1&cg1=post&cg2=toni%20castillo&cg3=seguridad&cg4=normal&cg5=200116&cd3=Ads%20Blocked&z=724941720 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_gid=973308409.1579615049&gjid=362079732&_v=j79&z=724941720 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_v=j79&z=724941720 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_v=j79&z=724941720&slf_rd=1&random=792243332
Request Chain 38
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx HTTP 302
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Request Chain 41
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1509052103&t=pageview&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&ul=en-us&de=UTF-8&dt=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aGDAAEABC~&jid=1122272541&gjid=1067937155&cid=133335796.1579615049&tid=UA-78515-62&_gid=973308409.1579615049&_r=1&cg1=post&cg2=toni%20castillo&cg3=seguridad&cg4=normal&cg5=200116&cd1=no&z=504226039 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_gid=973308409.1579615049&gjid=1067937155&_v=j79&z=504226039 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_v=j79&z=504226039 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_v=j79&z=504226039&slf_rd=1&random=3015830806
Request Chain 43
  • https://www.gravatar.com/avatar/c107b5d95e7878c0ae911c3e8cc302a3?default=https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg HTTP 302
  • https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
Request Chain 45
  • https://graph.facebook.com/402504386889031/picture HTTP 302
  • https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207049&hash=AeQfboGjRdX2uC3O
Request Chain 81
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 96
  • https://sb.scorecardresearch.com/p?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=402449864&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=4645591 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=402449864&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=4645591&cs_ak_ss=1
Request Chain 110
  • https://sb.scorecardresearch.com/b?c1=8&c2=21892462&c3=1001000630&ns__t=1579615052027&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=8&c2=21892462&c3=1001000630&ns__t=1579615052027&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Request Chain 130
  • https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvzSY93TZxERa769FxhjUD0qfKvZsU-i-yLyn5X6dvdAdDIPVlSlBTVhaTc6D3F2Ov-X27tneztFXaYlxmn_qOfR-V3Q9rctqkr1T2Xp9PPmi0c_H2UYL0ZxISwcVkY2lOZBYMeteoZuAluxKQatB3LW_2jh6IS1xciImq9wsPqLGcBhH1N_UjC51AVcwFhWyFinrumxkoGq1Hjc7o22vIMdxWvkN9wUWQMdF-iaJOmZmvwVAH4xBFCTJm7h6pDi12WjPeiqtfTAw&sai=AMfl-YQcf5nB1PbBopBOd6M6CXLN7E46TCBYvRnpfeoTOKKxuQ8hoG8WH64Y-bCFK1gnqfbvg81pb_fzl6gnHPWUh18cP_r4kX_Fswxbu983&sig=Cg0ArKJSzDD0s-OL4fTREAE&urlfix=1&adurl=https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js HTTP 302
  • https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Request Chain 251
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si

357 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa
www.genbeta.com/seguridad/
123 KB
32 KB
Document
General
Full URL
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.166 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-166.fra53.r.cloudfront.net
Software
/
Resource Hash
33715959af974e328e37c3b507d2c8b67a600497f55b169c50667b08422270a4

Request headers

:method
GET
:authority
www.genbeta.com
:scheme
https
:path
/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
content-type
text/html; charset=UTF-8
date
Tue, 21 Jan 2020 13:57:28 GMT
cache-control
no-cache, private
surrogate-control
content="ESI/1.0"
vary
Accept-Encoding
content-encoding
gzip
x-clientip
85.159.237.66
countrycode
NL
accept-ranges
bytes
x-cache
Miss from cloudfront
via
1.1 bae3e24625567f5728a5caa96d6b7669.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-amz-cf-id
_zQ8z9WPcLO9mpavcIZ_NsMrkwTOmguuqRX4rkEt1Nf8RiX6QV7eGA==
prebidGdpr.js
www.genbeta.com/js/
223 KB
71 KB
Script
General
Full URL
https://www.genbeta.com/js/prebidGdpr.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.166 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-166.fra53.r.cloudfront.net
Software
/
Resource Hash
865b8747d5495fe4cf1616e5d51c0bc0e8aa84b09be4c3ed32fcdd660d66d418

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:28 GMT
content-encoding
gzip
x-amz-cf-pop
FRA53
x-cache
Miss from cloudfront
status
200
x-clientip
85.159.237.66
countrycode
NL
content-length
72503
last-modified
Thu, 16 Jan 2020 08:04:43 GMT
etag
W/"37a95-59c3d47143cc0-gzip"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 bae3e24625567f5728a5caa96d6b7669.cloudfront.net (CloudFront)
accept-ranges
bytes
x-amz-cf-id
GQ3AgCXv_ecUeQVSVBR7vKT0XwRWf2vYO2EV-3tg9gg5NAct5e23QA==
x-cache-hits
59
loader.js
sdk.privacy-center.org/
1 KB
979 B
Script
General
Full URL
https://sdk.privacy-center.org/loader.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:7e00:5:b7cc:d3c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
abcd639be6398a19f725e2d129c449c6880bdb7108d061ab0b377049a7f893bf

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:25:42 GMT
content-encoding
gzip
server
CloudFront
age
1952
etag
"60b09d4e7ec1f2d7031254adf2feea6c"
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
status
200
cache-control
public, max-age=3600
x-amz-cf-pop
FRA53
content-length
651
via
1.1 831ce605dd77f58786c993787cdac90b.cloudfront.net (CloudFront)
x-amz-cf-id
NN6gs4SYA5UIDI28r9eWGI_WqLiCHiLyGLTrfgWl9gGoSxEDM_jlPQ==
main.css
img.weblogssl.com/css/genbeta/p/skin-site-default-d/
1 MB
131 KB
Stylesheet
General
Full URL
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
40dddfe034b75029b6fd12c496194da0aff7fb59bf33a72fcf3d8f157fc47a15

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:48 GMT
content-encoding
gzip
last-modified
Fri, 27 Dec 2019 09:43:21 GMT
server
AmazonS3
age
41
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
status
200
cache-control
max-age=30000000
x-amz-cf-pop
FRA53
x-amz-cf-id
GqLHTWHG_TJqoxWw5bPYezs2e8ZMVm4PabZhbO9lbLbk4ER3X2y9sw==
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
gpt.js
www.googletagservices.com/tag/js/
52 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8822a9d24093dfe6831458dc8d1dec2af6830052aa05ac33f22c972065f9f37
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 409 of 1000 / last-modified: 1579540049"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16148
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:28 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:28 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 22 Jan 2020 13:57:28 GMT
apstag.js
c.amazon-adsystem.com/aax2/
87 KB
25 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.194 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-194.fra53.r.cloudfront.net
Software
Server /
Resource Hash
3e6bd7935ed1c5dd439ec5688cf79b71fd5a2626ec5a0a35114664d32d2d5b48

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 20 Jan 2020 17:28:55 GMT
content-encoding
gzip
server
Server
age
73713
etag
35a83f4a8c9edf67149dc12b212a54c9
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA53
accept-ranges
bytes
x-amz-cf-id
kRzDkL7cPkOP8IHl4vxLg5nIMktk24uUoGyIDl7EfDbGeTvWPMmWuw==
via
1.1 36c13eeffcddf77ad33d7874b28e6168.cloudfront.net (CloudFront)
sdk.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
sdk-gcp.privacy-center.org/
309 KB
76 KB
Script
General
Full URL
https://sdk-gcp.privacy-center.org/sdk.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
Requested by
Host: sdk.privacy-center.org
URL: https://sdk.privacy-center.org/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:7dde:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
UploadServer /
Resource Hash
fb3204628c9947d9a28fd6adf9477ea77c0e6963512e1b8115ced5f381fb13a4

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Fri, 17 Jan 2020 16:24:45 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1579277317
age
336763
status
200
x-guploader-uploadid
AEnB2Uo4JI_GQ0v_kLeKYZ7ndvPVIoEWcb60CSS1OAEXLO6-jfYai_GYNc0nF41sbZazp5B1ETYvO2VCg_o8PS2p5Io2olb9jL7-pSjc0ecdAE6AH-xedqU
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
2
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
77329
last-modified
Fri, 17 Jan 2020 16:23:57 GMT
server
UploadServer
etag
"65b24a8d32b6177452b0ed156801da13"
vary
Accept-Encoding
x-goog-hash
crc32c=vqKdMQ==, md5=ZbJKjTK2F3RSsO0VaAHaEw==
x-goog-generation
1579278237915990
cache-control
public, max-age=31536000
x-goog-stored-content-length
77329
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
expires
Sat, 16 Jan 2021 16:24:45 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011601.js
securepubads.g.doubleclick.net/gpt/
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
54c05d108ce5e65e51412d1667e583e90a8d22233e33e78deea09b903530a0e4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 16 Jan 2020 14:06:36 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61850
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:28 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.194 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-194.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Mon, 20 Jan 2020 14:05:50 GMT
content-encoding
gzip
vary
Origin
age
85899
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Wed, 08 Jan 2020 04:09:03 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 ec27b2a550cb7db6ef54f74603010b29.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA53
x-amz-cf-id
UV4zEV6fJXdFrVuob3lgT9GnyJjpju42Wmwc0lYYTGd98sawrHORHw==
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
1153
date
Tue, 21 Jan 2020 13:38:15 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Tue, 21 Jan 2020 15:38:15 GMT
ui-gdpr-es.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
sdk-gcp.privacy-center.org/
177 KB
38 KB
Script
General
Full URL
https://sdk-gcp.privacy-center.org/ui-gdpr-es.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
Requested by
Host: sdk-gcp.privacy-center.org
URL: https://sdk-gcp.privacy-center.org/sdk.dc374e01b0cc0573baf4aa63b1dc3a15a38cc23d.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:7dde:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
UploadServer /
Resource Hash
edc9dc0d41064a3aee8877727c4a265bfcfb2f6da4aba0e10232b7fb3578a4a5

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Fri, 17 Jan 2020 16:24:52 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1579277317
age
336756
status
200
x-guploader-uploadid
AEnB2UqZS5SLOeaXJU7ItQXi8rWTivUnVyifS19h_ywMJTvur0s0sI-jxWIEWRI7xibp7WNbZmu5nk9h3D-hKt354KBMXf2-GA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
2
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
38506
last-modified
Fri, 17 Jan 2020 16:23:58 GMT
server
UploadServer
etag
"bad4f290cf4ef5f5157aa49f95096719"
vary
Accept-Encoding
x-goog-hash
crc32c=tyyFnQ==, md5=utTykM9O9fUVeqSflQlnGQ==
x-goog-generation
1579278238086526
cache-control
public, max-age=31536000
x-goog-stored-content-length
38506
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
expires
Sat, 16 Jan 2021 16:24:52 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035191&ns__t=1579615048905&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windo...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615048905&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Wind...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615048905&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:28 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035191&ns__t=1579615048905&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:28 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
bid
c.amazon-adsystem.com/e/dtb/
116 B
498 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3500&u=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&pid=ySdfpkNw1XAal&cb=0&ws=1600x1200&v=7.45.01&t=3000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-TOP-interior%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22160x600%22%2C%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-LAT-interior%22%7D%2C%7B%22sd%22%3A%222%22%2C%22s%22%3A%5B%22160x600%22%2C%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-LAT2-interior%22%7D%2C%7B%22sd%22%3A%223%22%2C%22s%22%3A%5B%22300x250%22%2C%22728x90%22%2C%22970x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-CEN-interior%22%7D%2C%7B%22sd%22%3A%224%22%2C%22s%22%3A%5B%22300x250%22%2C%22728x90%22%2C%22970x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-CEN2-interior%22%7D%2C%7B%22sd%22%3A%225%22%2C%22s%22%3A%5B%22300x250%22%2C%22728x90%22%5D%2C%22sn%22%3A%22%2F1018282%2FGEB-BOT2-interior%22%7D%5D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.194 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-194.fra53.r.cloudfront.net
Software
Server /
Resource Hash
75bfc8af082050cd05bad66f4c5135ff7d3717b9bab80f53a03046ef8a0ac20e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
server
Server
x-amz-cf-pop
FRA53
status
200
vary
Accept-Encoding,User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
124
via
1.1 36c13eeffcddf77ad33d7874b28e6168.cloudfront.net (CloudFront)
x-amz-cf-id
uvmEFY33CkkURFrIhpMQaQOl2orhQ9Lz3uZkzsHTKXt1AlDfqT31lQ==
1366_2000.jpg
i.blogs.es/344052/anotacion-2020-01-16-155848/
95 KB
95 KB
Image
General
Full URL
https://i.blogs.es/344052/anotacion-2020-01-16-155848/1366_2000.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3b83b8eda9b0d6096786fdec2357d916bdd1e06f8e8745fa57d79ac8615ab1d0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Thu, 16 Jan 2020 15:30:42 GMT
server
AmazonS3
age
41
etag
"d6ef5abe3d195f74182b8ec5b5a1d91f"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
96992
x-amz-cf-id
CAP4dBSR_dZq1FsrkPKmuwKZhGeNKxxWnG7HKyWTMfO6WXNUFWTX_A==
head-brand-logo.svg
img.weblogssl.com/css/genbeta/p/skin-site-default-d/images/
8 KB
4 KB
Image
General
Full URL
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/images/head-brand-logo.svg?v=129
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
b07ae2953d8bd79f884eaf056987bd50dc9b8729f701a693d0511020f2f02fcf

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:44 GMT
content-encoding
gzip
last-modified
Tue, 13 Mar 2018 15:58:46 GMT
server
AmazonS3
age
18825
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
cache-control
max-age=30000000
x-amz-cf-pop
FRA53
x-amz-cf-id
IAbteMcOTe3ndQ98jNksdyipbnnw1F9uyBPp7e0CHJbRJJfA89E0hw==
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
icons.ttf
img.weblogssl.com/g/r/icons/
15 KB
10 KB
Font
General
Full URL
https://img.weblogssl.com/g/r/icons/icons.ttf?bv10vh6
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d8fce0ac98e2953582074d8a56b540d7f599161bf44dca85c7dd7458ce2198bd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 08:31:29 GMT
content-encoding
gzip
last-modified
Mon, 21 Oct 2019 10:22:35 GMT
server
AmazonS3
age
19561
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
access-control-allow-methods
GET, PUT, HEAD
content-type
application/font-sfnt
status
200
access-control-max-age
3000
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA53
access-control-allow-origin
*
x-amz-cf-id
HFsNT81OuyRVj__QjcDTjT2T9C15SLCZkFQRFB-2suMyWFOtdJejqA==
via
1.1 9edca61f65102033971d096a9351690a.cloudfront.net (CloudFront)
icon-fire.png
img.weblogssl.com/g/r/svg/
1008 B
1 KB
Image
General
Full URL
https://img.weblogssl.com/g/r/svg/icon-fire.png?v=129
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9ab17e8bc3643997f26bbef40677b44acd0e71d10c2663a26f8326b7c095ac9e

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:44 GMT
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
last-modified
Tue, 02 Jul 2019 10:42:23 GMT
server
AmazonS3
age
18825
etag
"dffaeb59a843985a8200769ac04b442d"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
1008
x-amz-cf-id
8GQQFLNexKDrTlklHXz0YOm_E4VSfWHGjC6tmI_fZH4EKQeF0g99mA==
ff329d574153a568ed655b21d630d8ab
www.gravatar.com/avatar/
2 KB
3 KB
Image
General
Full URL
https://www.gravatar.com/avatar/ff329d574153a568ed655b21d630d8ab?s=80&d=mm&r=g
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
c860bc9b319a421b24a4322ba7c5a6d36beecfd0fa884563040da57d793fb4d9

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-nc
HIT fra 2, BYPASS fra 1
date
Tue, 21 Jan 2020 13:57:29 GMT
last-modified
Mon, 17 Apr 2017 20:45:38 GMT
server
nginx
access-control-allow-origin
*
source-age
1841495
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="ff329d574153a568ed655b21d630d8ab.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/ff329d574153a568ed655b21d630d8ab?s=80&d=mm&r=g>; rel="canonical"
content-length
2478
expires
Tue, 21 Jan 2020 14:02:29 GMT
94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/
Redirect Chain
  • https://platform.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
  • https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
176 KB
47 KB
Script
General
Full URL
https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
fa795a51e041bc779cc1f46677354e2358567a1e2a4b6c50d3493e4f8d718627

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 19:25:49 GMT
server
nginx
age
425219
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592001
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
48048

Redirect headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
418569
location
https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
text/html; charset=UTF-8
status
301
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
vary
Accept-Encoding
content-length
243
widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
4dced00354b099d831f860145bbd0149f99889d4c45632e4d9e849f008123866

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:50:12 GMT
Server
ECS (fcn/40E8)
Age
907
Etag
"09356930f7674f04e767f5b1203faeb7+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800, stale-while-revalidate=30
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
28838
375_142.jpg
i.blogs.es/267e3b/iphone-x-3706545_1920/
11 KB
12 KB
Image
General
Full URL
https://i.blogs.es/267e3b/iphone-x-3706545_1920/375_142.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
167f7548988de7748099138bb9a6692cc3ccf1b0807b0244c64a7bcbff9ee8dd

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Mon, 13 Jan 2020 15:21:35 GMT
server
AmazonS3
age
41
etag
"9975466d685a236d05e2e3239f1c434c"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
11614
x-amz-cf-id
vKSTdb1TVj3XXyNNcMHXWkiVuwNEIbcmENTpBT2hirYUqqYNEGPwsA==
social-email.svg
img.weblogssl.com/g/r/svg/
970 B
1 KB
Image
General
Full URL
https://img.weblogssl.com/g/r/svg/social-email.svg?v=129
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
526c2c5dc827525752c2e918fa14dbba227db1ffacd4c8dd4d521154a25f08ba

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:45 GMT
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
last-modified
Tue, 04 Jun 2019 07:49:54 GMT
server
AmazonS3
age
18825
etag
"7ee9baaa63509512a14308b764a760ee"
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
970
x-amz-cf-id
KJ_QAbBiX3AsbK0hi9JLtLVj8EMk7yLn08vRLzoflJi6_ClPAFRlrg==
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1509052103&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubie...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_gid=973308409.1579615049&gjid=362079732&_v=j79&z=724941720
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_v=j79&z=724941720
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_v=j79&z=724941720&slf_rd=1&random=792243332
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_v=j79&z=724941720&slf_rd=1&random=792243332
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-6&cid=133335796.1579615049&jid=365454835&_v=j79&z=724941720&slf_rd=1&random=792243332
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
mqdefault.jpg
img.youtube.com/vi/WuFr-XRIDb4/
13 KB
14 KB
Image
General
Full URL
https://img.youtube.com/vi/WuFr-XRIDb4/mqdefault.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d558c1334627402db5608947786ac8791b88c098d0318b9cbdc03657dd41b1ac
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:50:50 GMT
x-content-type-options
nosniff
server
sffe
age
399
etag
"1579013622"
content-type
image/jpeg
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
13498
x-xss-protection
0
expires
Tue, 21 Jan 2020 15:50:50 GMT
mqdefault.jpg
img.youtube.com/vi/x6ke5rgwkR8/
12 KB
12 KB
Image
General
Full URL
https://img.youtube.com/vi/x6ke5rgwkR8/mqdefault.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
82d1d88540b664a8970417f0d3431fcd0bd57f788a95a48658730538245c5c93
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:54:56 GMT
x-content-type-options
nosniff
server
sffe
age
153
etag
"1577122649"
content-type
image/jpeg
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
12636
x-xss-protection
0
expires
Tue, 21 Jan 2020 15:54:56 GMT
mqdefault.jpg
img.youtube.com/vi/wBgD1THVuZ8/
15 KB
15 KB
Image
General
Full URL
https://img.youtube.com/vi/wBgD1THVuZ8/mqdefault.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2d6b715ef20845c2731dc09374196e0c01c2f98c34475d37e2095451f665ce4b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:35:29 GMT
x-content-type-options
nosniff
server
sffe
age
1320
etag
"1576513755"
content-type
image/jpeg
status
200
cache-control
public, max-age=7200
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15376
x-xss-protection
0
expires
Tue, 21 Jan 2020 15:35:29 GMT
jwplayer.js
www.genbeta.com/jwplayer/
99 KB
32 KB
Script
General
Full URL
https://www.genbeta.com/jwplayer/jwplayer.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.166 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-166.fra53.r.cloudfront.net
Software
/
Resource Hash
1e7ba5371773a7836d7bf94a91a1ab386f10786ce97c039cf83d2adbdaf34cef

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
x-amz-cf-pop
FRA53
x-cache
Miss from cloudfront
status
200
x-clientip
85.159.237.66
countrycode
NL
content-length
32538
last-modified
Thu, 16 Jan 2020 08:04:43 GMT
etag
W/"18ca8-59c3d47143cc0-gzip"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 bae3e24625567f5728a5caa96d6b7669.cloudfront.net (CloudFront)
accept-ranges
bytes
x-amz-cf-id
nMxW4dl8tgzDzBKXu-dSxMRAT-x3JYpgyZz32-EVQFnO7pVgC1QCeA==
x-cache-hits
49
postpage-cdeb2da9.js
img.weblogssl.com/LPbackend/prod/v2/js/
874 KB
233 KB
Script
General
Full URL
https://img.weblogssl.com/LPbackend/prod/v2/js/postpage-cdeb2da9.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
79afcf8f4da54ebf108e0a255d15bbd3316ed24b8ed3de3c7c8e0dd2c3f41e21

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
last-modified
Thu, 16 Jan 2020 08:04:36 GMT
server
AmazonS3
age
41
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA53
x-amz-cf-id
O5px_84jAyadVDiaz_HHTGYMOkBwGS6qcJ00CA6Tieq_rddW49JK9w==
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
common-modules-cdeb2da9.js
img.weblogssl.com/LPbackend/prod/v2/js/
33 KB
11 KB
Script
General
Full URL
https://img.weblogssl.com/LPbackend/prod/v2/js/common-modules-cdeb2da9.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
71caaaca33d06f8fa9966d8fcd7d8b3fc63c38925d2e52c4a646706a28930812

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:49 GMT
content-encoding
gzip
last-modified
Thu, 16 Jan 2020 08:04:33 GMT
server
AmazonS3
age
41
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA53
x-amz-cf-id
m9cjlHsev0Git2EA8Sn2Mo4M6fnyGWC9SlWm3UgngC7bzEQ5wS2DPw==
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
script
recommendations.weblogssl.com/genbeta/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa/NL/
22 KB
4 KB
Script
General
Full URL
https://recommendations.weblogssl.com/genbeta/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa/NL/script?category=seguridad&picture_tag=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:e200:16:9f91:2d80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Express
Resource Hash
0151162d6b78cfcb661baed6bf787e178abc68e6a7da3131dea0aefbf5c13837

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
x-amz-cf-pop
FRA53
x-powered-by
Express
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
application/javascript; charset=utf-8
status
200
access-control-allow-origin
*
x-amz-cf-id
2LUZ3eBbSl6yBzNNzXS5WqQnOUECv66DCze5zw1TdrlfppG1w6a51w==
via
1.1 2f43d3215923fbce97b22ee733b0401f.cloudfront.net (CloudFront)
script
recommendations.weblogssl.com/editorial/genbeta/
7 KB
2 KB
Script
General
Full URL
https://recommendations.weblogssl.com/editorial/genbeta/script?picture_tag=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:e200:16:9f91:2d80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Express
Resource Hash
3a02c7c42a3d53c628d411e2a7e2e05736f4a9eca24a2e6191e20cbb7412c96e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:46:39 GMT
content-encoding
gzip
age
650
x-powered-by
Express
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
status
200
x-amz-cf-pop
FRA53
access-control-allow-origin
*
x-amz-cf-id
XAQB2oz2rdzXyh9P0NqistPrqI-HZA4VNfOZ9Hcb6E9cFHhEjZyMhQ==
via
1.1 2f43d3215923fbce97b22ee733b0401f.cloudfront.net (CloudFront)
/
adserver.video/serve/wbl/
0
243 B
Script
General
Full URL
https://adserver.video/serve/wbl/?raiSite=gb&ord=1579615048
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
178.33.230.6 , France, ASN16276 (OVH, FR),
Reverse DNS
cm002.richaudience.com
Software
nginx/1.10.3 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Server
nginx/1.10.3
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
webedia-default.svg
img.weblogssl.com/g/r/svg/webedia/
8 KB
4 KB
Image
General
Full URL
https://img.weblogssl.com/g/r/svg/webedia/webedia-default.svg?v=129
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a7c524af142ac2b99d4f9bf37fe7bdc13abcb6eef227c8ff299448513f13a7c5

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:45 GMT
content-encoding
gzip
last-modified
Tue, 04 Jun 2019 07:49:54 GMT
server
AmazonS3
age
18825
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
x-amz-cf-pop
FRA53
x-amz-cf-id
QcKjqCIoSnT9PJ8uRCGycPBsG_Y1l4ZtA_1ZDSj7nLcu-orsn2Sl2Q==
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
logo-light.svg
img.weblogssl.com/css/xataka/p/r/images/
3 KB
2 KB
Image
General
Full URL
https://img.weblogssl.com/css/xataka/p/r/images/logo-light.svg?v=129
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3d1b40a4df9ccc5fda3c6e8724e2464ac6c20896af9c9d0d3b70727d96a5a610

Request headers

Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 08:43:45 GMT
content-encoding
gzip
last-modified
Tue, 13 Mar 2018 15:29:21 GMT
server
AmazonS3
age
18825
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
status
200
cache-control
max-age=30000000
x-amz-cf-pop
FRA53
x-amz-cf-id
pwOU8iG47n5PayqRKa12V2TQCdiaMB9v71VEmpf0vPZNn4JZj_5TNg==
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
favicons.ttf
img.weblogssl.com/g/r/icons/
13 KB
10 KB
Font
General
Full URL
https://img.weblogssl.com/g/r/icons/favicons.ttf?n1rtsy
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
df7f859834554abb56ef81c305e90496ef00133badd6c088321577e116418619

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://img.weblogssl.com/css/genbeta/p/skin-site-default-d/main.css?v=1579594740
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 08:31:29 GMT
content-encoding
gzip
last-modified
Wed, 18 Sep 2019 06:10:15 GMT
server
AmazonS3
age
19561
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
access-control-allow-methods
GET, PUT, HEAD
content-type
application/font-sfnt
status
200
access-control-max-age
3000
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA53
access-control-allow-origin
*
x-amz-cf-id
9AQZIfnEayeFhW6Sj5PnehWd9PACf4KCymR2Y_eKhqQkRd84pf-hRg==
via
1.1 9edca61f65102033971d096a9351690a.cloudfront.net (CloudFront)
widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html
platform.twitter.com/widgets/ Frame D3C2
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html?origin=https%3A%2F%2Fwww.genbeta.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40AE) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
1004722
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
Content-Type
text/html; charset=utf-8
Date
Tue, 21 Jan 2020 13:57:29 GMT
Etag
"4b563298f37eb3ef2a2f8897be83c714+gzip"
Last-Modified
Thu, 09 Jan 2020 22:38:16 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40AE)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
Cookie set iu3
aax-eu.amazon-adsystem.com/s/ Frame 221E
Redirect Chain
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
0
0
Document
General
Full URL
https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.220.16 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash

Request headers

Host
aax-eu.amazon-adsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Cookie
ad-id=AyKnAzu_mkM1hzNXHUszLgE|t
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Server
Server
Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Type
text/html;charset=ISO-8859-1
Content-Length
192
Connection
keep-alive
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma
no-cache
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Set-Cookie
ad-id=AyKnAzu_mkM1hzNXHUszLgE; Domain=.amazon-adsystem.com; Expires=Thu, 01-Oct-2020 13:57:29 GMT; Path=/; Secure; HttpOnly; SameSite=None ad-privacy=0; Domain=.amazon-adsystem.com; Expires=Tue, 01-Apr-2025 13:57:29 GMT; Path=/; Secure; HttpOnly; SameSite=None
Vary
Accept-Encoding,User-Agent
Content-Encoding
gzip

Redirect headers

Server
Server
Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Length
0
Connection
keep-alive
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma
no-cache
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Location
https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_dm_dmx&dcc=t
Set-Cookie
ad-id=AyKnAzu_mkM1hzNXHUszLgE|t; Domain=.amazon-adsystem.com; Expires=Thu, 01-Oct-2020 13:57:29 GMT; Path=/; Secure; HttpOnly; SameSite=None
Vary
User-Agent
all.js
connect.facebook.net/es_ES/
190 KB
57 KB
Script
General
Full URL
https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Requested by
Host: img.weblogssl.com
URL: https://img.weblogssl.com/LPbackend/prod/v2/js/postpage-cdeb2da9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e501b55feccffb84458adf8f65df7a29f6f31c6a8ab7d3e3bed678c5b60e69ea
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
+ezGwQKfWUYWoRb7b6sMvQ==
status
200
date
Tue, 21 Jan 2020 13:57:29 GMT, Tue, 21 Jan 2020 13:57:29 GMT
expires
Sat, 16 Jan 2021 08:49:05 GMT
alt-svc
h3-24=":443"; ma=3600
content-length
57715
x-fb-debug
jkagj3dsaZeOkuHZ+93sWhl4tjVOY1SI29l3aDO+40ubr80HGsMrjeYtt/IvuEfVP0b7w8OIt9CGGYe3xUt5PA==
x-fb-trip-id
1850256238
x-fb-content-md5
f2960c93c6992521837ec5921052912c
etag
"2fe5105139daf0046443e767eb7b08aa"
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
collect
www.google-analytics.com/
35 B
108 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=1509052103&t=pageview&_s=2&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&ul=en-us&de=UTF-8&dt=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aGDAAEABC~&jid=&gjid=&cid=133335796.1579615049&tid=UA-78515-6&_gid=973308409.1579615049&cg1=post&cg2=toni%20castillo&cg3=seguridad&cg4=normal&cg5=200116&cd3=Ads%20Blocked&cd1=no&z=703867258
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 20 Jan 2020 18:31:41 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
69948
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1509052103&t=pageview&_s=1&dl=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubiert...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_gid=973308409.1579615049&gjid=1067937155&_v=j79&z=504226039
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_v=j79&z=504226039
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_v=j79&z=504226039&slf_rd=1&random=3015830806
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_v=j79&z=504226039&slf_rd=1&random=3015830806
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-78515-62&cid=133335796.1579615049&jid=1122272541&_v=j79&z=504226039&slf_rd=1&random=3015830806
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
avatar.png
img.weblogssl.com/css/genbeta/p/v7/images/
609 B
953 B
Image
General
Full URL
https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a8b91381e4d8b2ae1f62fe9a02985dad6e77e23be53c041762dd5e2ea6d417fc

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
last-modified
Tue, 13 Mar 2018 13:36:57 GMT
server
AmazonS3
age
40
etag
"feb5cda1d174bf035720cf094d428d76"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=30000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
609
x-amz-cf-id
tUabBWPHzBekpFsQ9-IIr99CPeR8pK2KDw_OxhUwzH2HX-uwmhfcoQ==
avatar.jpg
i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/
Redirect Chain
  • https://www.gravatar.com/avatar/c107b5d95e7878c0ae911c3e8cc302a3?default=https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg
  • https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
356 B
627 B
Image
General
Full URL
https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
b64c9f0e95e4baf25a13cf189ada24c9befbb4d9743f8085af11ffc131627c58
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-nc
HIT ams 3
date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
x-bytes-saved
408
last-modified
Mon, 04 Feb 2019 07:15:08 GMT
server
nginx
etag
"5b056abee383b575"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg>; rel="canonical"
content-length
356
expires
Wed, 03 Feb 2021 19:15:08 GMT

Redirect headers

x-nc
HIT fra 3, MISS fra 1
date
Tue, 21 Jan 2020 13:57:29 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
source-age
1316995
location
https://i0.wp.com/img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg?ssl=1
content-type
text/html; charset=utf-8
status
302
cache-control
max-age=300
link
<https://www.gravatar.com/avatar/c107b5d95e7878c0ae911c3e8cc302a3?default=https://img.weblogssl.com/css/genbeta/p/v7/images/avatar.jpg>; rel="canonical"
content-length
0
expires
Tue, 21 Jan 2020 14:02:29 GMT
709548_1.png
img.weblogssl.com/avatar/mini/
3 KB
3 KB
Image
General
Full URL
https://img.weblogssl.com/avatar/mini/709548_1.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.79 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-79.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ca3e485bd6ba07030ec71a5f83806a6669e08324fcf9bc949a4e30e285fabd29

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
age
40
x-cache
Hit from cloudfront
status
200
x-amz-meta-mode
33188
content-length
2567
last-modified
Fri, 10 May 2013 17:31:18 GMT
server
AmazonS3
etag
"95bdc7c2e1c8d799087b8f5199d400e2"
x-amz-meta-uid
0
x-amz-meta-gid
0
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
pn5m8SlvI3JYy-2UvgGiHpGARluxKn3TFLFRjkjq9Uzm7UNUHF0RPQ==
x-amz-meta-mtime
1368207077
/
platform-lookaside.fbsbx.com/platform/profilepic/
Redirect Chain
  • https://graph.facebook.com/402504386889031/picture
  • https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207049&hash=AeQfboGjRdX2uC3O
1014 B
1 KB
Image
General
Full URL
https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207049&hash=AeQfboGjRdX2uC3O
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
8f54940ad996a668b7f2d7a4dc8dacc67b7345cfcb9dcf249bc85daa77d4b976

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-haystack-needlechecksum
303121091
date
Tue, 21 Jan 2020 13:57:29 GMT, Tue, 21 Jan 2020 13:57:29 GMT
last-modified
Thu, 28 Feb 2019 00:59:13 GMT
access-control-allow-origin
*
content-type
image/jpeg
status
200
content-disposition
attachment
cache-control
max-age=1209600, no-transform
x-needle-checksum
2647768984
x-fb-config-version-olb-prod
677
content-length
1014

Redirect headers

strict-transport-security
max-age=15552000; preload
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
302
x-fb-rev
1001623205
alt-svc
h3-24=":443"; ma=3600
content-length
0
pragma
no-cache
x-fb-debug
eiCgLVdCluo45H+BEGshqmQ/+Cn78M01dSzghEsyFAZaXZs/7oo89rbtGBddXENmTa7uiQfEnoN8++hPJVQH6g==
x-fb-trace-id
CsWP1WOAqes
date
Tue, 21 Jan 2020 13:57:29 GMT, Tue, 21 Jan 2020 13:57:29 GMT
location
https://platform-lookaside.fbsbx.com/platform/profilepic/?asid=402504386889031&height=50&width=50&ext=1582207049&hash=AeQfboGjRdX2uC3O
content-type
image/jpeg
access-control-allow-origin
*
x-fb-request-id
A41kr_xcBU4I-tomLOSlOU7
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.11
expires
Sat, 01 Jan 2000 00:00:00 GMT
500_333.jpg
i.blogs.es/499429/poco2/
31 KB
31 KB
Image
General
Full URL
https://i.blogs.es/499429/poco2/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
bf1c443a827273d6b26bbd062a28b9096387587863bf1cf0583c88778cb8290b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:02:46 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Tue, 21 Jan 2020 12:59:37 GMT
server
AmazonS3
age
3284
etag
"b8457f73e3103bf3fbfd414f920f2b14"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
31367
x-amz-cf-id
3RX6Lyy-Sd6RE_M4nNsHzM_Ds0yyu00GXCZHp8E355MbtcRlH_w66Q==
500_333.jpg
i.blogs.es/8e0e80/instagram/
52 KB
52 KB
Image
General
Full URL
https://i.blogs.es/8e0e80/instagram/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
cbcc56855ce6374616c16c788f239f5cf55ec86b8b50b03b56970dfad494efcc

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 12:11:22 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Tue, 21 Jan 2020 12:02:59 GMT
server
AmazonS3
age
6368
etag
"1e1ae87c276265b3d7e61df40b6495eb"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
52858
x-amz-cf-id
L0Soxaevid0mjWktzpsDUcZ2ri6HsiDADMdASekDI7U4YDEhklIXQw==
500_333.jpg
i.blogs.es/44566a/opensource/
29 KB
29 KB
Image
General
Full URL
https://i.blogs.es/44566a/opensource/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
1260ecc58be538d24c0a71138356afbc452c5c2bb182246d5354fcdf332a54dc

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 12:11:22 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Tue, 21 Jan 2020 09:49:39 GMT
server
AmazonS3
age
6368
etag
"61fd583fb5390949cecd1861329c91ce"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
29708
x-amz-cf-id
uVDmcBmdxxh6PqXftmpsREAodQz5C52KRmcUNyyhRkfOdoXu_S637w==
500_333.jpg
i.blogs.es/a35450/nacho-monge-samsung-tv/
36 KB
36 KB
Image
General
Full URL
https://i.blogs.es/a35450/nacho-monge-samsung-tv/500_333.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c278c8a700999a18448631a9c15226e3387c288d798f1945a27aebfea5b22d7f

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 11:17:38 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Mon, 20 Jan 2020 12:30:51 GMT
server
AmazonS3
age
9592
etag
"bfcea677aa7ab6d687c50c6ad0a0ab43"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
36950
x-amz-cf-id
A9yE9In0tRikfnV64jDLWJ1A6w2FzuhAeexFkmqLUTRFsyd20k9qaw==
eu_country.php
static.sunmedia.tv/SMVpaidCreatives/geotarget/
19 B
314 B
XHR
General
Full URL
https://static.sunmedia.tv/SMVpaidCreatives/geotarget/eu_country.php
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.68.35.185 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3128584.ip-51-68-35.eu
Software
nginx /
Resource Hash
2fd18698a9c07c01ed01e19274ad4cd456e1faabc8b226a17efc63b3220ef3e2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
tp-cache
HIT
server
nginx
age
97036
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
https://www.genbeta.com
content-length
19
country.php
services.sunmedia.tv/geotarget/
16 B
261 B
XHR
General
Full URL
https://services.sunmedia.tv/geotarget/country.php
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
61eae0480dcc464beb4cd150bf5b44a5e0654919abd845f74fbadf913876f1af

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
tp-cache
HIT
server
nginx
age
337399
vary
Accept-Encoding
content-type
application/json
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
https://www.genbeta.com
content-length
16
intext-1-0.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
3 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/intext-1-0.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.68.35.185 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3128584.ip-51-68-35.eu
Software
nginx /
Resource Hash
08cab8137683bffc64b24806380c01dd8c16961b1b743831b77e6b21a4e60ce9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
tp-cache
HIT
last-modified
Wed, 11 Dec 2019 18:55:21 GMT
server
nginx
age
97026
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
2568
accept-ranges
bytes
x-device
desktop
outstream.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
4 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/outstream.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.68.35.185 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3128584.ip-51-68-35.eu
Software
nginx /
Resource Hash
c7ef7c6a54790c868c5d7e400a17a922f3d646fe8a47d98db133070da6a5fe34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
tp-cache
HIT
last-modified
Wed, 18 Dec 2019 21:20:23 GMT
server
nginx
age
97028
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
3403
accept-ranges
bytes
x-device
desktop
adblockDetector.js
static.sunmedia.tv/SMSdk/assets/AdBlockDetection/
13 KB
5 KB
Script
General
Full URL
https://static.sunmedia.tv/SMSdk/assets/AdBlockDetection/adblockDetector.js
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
4984c39b03cddab1198a70add535b4600ac615d3e938edbec8d2d8b53b9f0a60

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:16 GMT
server
nginx
age
425326
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
content-length
4831
650_1200.png
ti.blogs.es/16ac21/captura-de-pantalla-2020-01-07-a-las-15.57.42/
673 KB
674 KB
Image
General
Full URL
https://ti.blogs.es/16ac21/captura-de-pantalla-2020-01-07-a-las-15.57.42/650_1200.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.38 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-38.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
592ecd87c45bffdd59f7d80bc3bfe22e8df17ef881d7295d9213113dc02c9f6c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 07 Jan 2020 15:22:29 GMT
via
1.1 1f95d1a95c6f2df8073daccac07b7570.cloudfront.net (CloudFront)
last-modified
Tue, 07 Jan 2020 14:57:56 GMT
server
AmazonS3
age
1204501
etag
"160e83a50833f0fe574c4ec30c3764f4"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
689028
x-amz-cf-id
WgfrEaFajTbOEbVu8b2T2PhVae47AeZv7iaQJREaNnOLcqXqW1PQtA==
150_150.jpg
i.blogs.es/56b911/1366_2000-1-/
6 KB
6 KB
Image
General
Full URL
https://i.blogs.es/56b911/1366_2000-1-/150_150.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
47bff4fb8bdcfdb16fc446be22ffc6ca19f9fd96338f113e1e0f31e02a48c320

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:30 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Mon, 11 Nov 2019 14:30:45 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"47bcc63f24e860c8c8d5cf53c01f1067"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
5767
x-amz-cf-id
GZ3qyJldy6cEOObjGu3RcG5V_4HC7zn00njtvJGIfdH8KUuVcn1FzQ==
150_150.png
i.blogs.es/dd52d1/ransomware/
6 KB
7 KB
Image
General
Full URL
https://i.blogs.es/dd52d1/ransomware/150_150.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6f2256265e487a257c99c444646f59e7efd09e1984412bb5d83b446c65dfb3fd

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:56:50 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Mon, 04 Nov 2019 15:09:01 GMT
server
AmazonS3
age
40
etag
"4dbc59d36f0fb533b8817c3bb11c0384"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
6642
x-amz-cf-id
QMgOAMcZzZW79s-OA8P2n-Cx16O5REJn-GOcdFT62ShzsMntTbCGHQ==
150_150.jpg
i.blogs.es/cc8b46/windows-app-apps-gratis/
6 KB
6 KB
Image
General
Full URL
https://i.blogs.es/cc8b46/windows-app-apps-gratis/150_150.jpg
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
78f4054edd22b0969b80e1e581a826eb9796a6a46850dd3d42cbfbfe90fc1791

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 20 Jan 2020 00:21:13 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Thu, 26 Dec 2019 12:12:31 GMT
server
AmazonS3
age
135377
etag
"1ca063da3a03f41921d159914c49239c"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
6043
x-amz-cf-id
WyRJnzIUMdqq0v7tygy0fLYSwtchG70Qj1Fmn1kCRBY00LtIbctNVw==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?event=view&campaignId=8498&medium=recommended_posts&device=desktop
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.197 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-197.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 07 Jan 2020 15:22:29 GMT
Via
1.1 c40ee2288a7db28fefd61c3f2ec7ccd7.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
Age
1204501
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Hit from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
X-Amz-Cf-Pop
FRA53
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
2ypjPOVVeJ1VJDQETOrnXO9_E6HVCPjOiKMT7WnUaY_UvAv9vj1_gg==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?event=view&editorialCampaignId=1298
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.197 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-197.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 05 Jan 2020 23:26:03 GMT
Via
1.1 b2eb119180a1f499dade55aa4e26c619.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
Age
1348287
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Hit from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
X-Amz-Cf-Pop
FRA53
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
TLRhOTvEBBGMW_xApE1l9TQKghiYANSTPEMVHUNt0HBEZhq0TyOMNQ==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?recommendationsAction=view&device=desktop&recommendationVersion=374&campaign=recommended_club&containers=topPosts,topPostsByCategory,topPosts,top3MonthCategoryPosts,topPostsByCategory,top3MonthCategoryPosts
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.197 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-197.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:30 GMT
Via
1.1 bae3e24625567f5728a5caa96d6b7669.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA53
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Miss from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
OQ9Q9gHPXo-jFtsCuw1E4AqifjmmeMXpx6tFeKSSiR8q1ITthdsuFg==
abtest.png
ab.blogs.es/
923 B
1 KB
Image
General
Full URL
https://ab.blogs.es/abtest.png?sidebarRecommendations=view&device=desktop&recommendationVersion=374&containers=top3MonthCategoryPosts,top3MonthCategoryPosts,topPosts
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.197 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-197.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174f05b8200fb4490c8ce9bbc833cdb6ac85ca5e33189ddb0b75c2c5e991e691

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 08:55:00 GMT
Via
1.1 9edca61f65102033971d096a9351690a.cloudfront.net (CloudFront)
Last-Modified
Wed, 04 Nov 2015 10:49:20 GMT
Server
AmazonS3
Age
18149
ETag
"129f05c18a5cedaa173c43366af65ca0"
X-Cache
Hit from cloudfront
Content-Type
image/png
Cache-Control
no-cache, no-store
X-Amz-Cf-Pop
FRA53
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
923
X-Amz-Cf-Id
mgGLM7-XHdjN1gFDAoyVwZ0Vcn8sZQRf5u31_HFpChYcsgJtzgrWyQ==
moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
636dbf4f87fa130596fdb491938e4ad2b693b397139ba7f8d2a34b738a494078

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:38:02 GMT
Server
ECS (fcn/40D2)
Age
1004727
Etag
"352656b32c7e3a4e623687d598b66f66+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7937
tweet.2d3dab8467c8e4cdce5682bb8dbbe4cd.js
platform.twitter.com/js/
17 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/js/tweet.2d3dab8467c8e4cdce5682bb8dbbe4cd.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A0) /
Resource Hash
87c40d1935f1b97602939d59a8bb89f9c4453f04db5af06fad9eae9a9f73b45c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:38:02 GMT
Server
ECS (fcn/41A0)
Age
1004727
Etag
"f236198db47744d3d5115002e9724381+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
5738
xd_arbiter.php
staticxx.facebook.com/connect/ Frame B40A
0
0
Document
General
Full URL
https://staticxx.facebook.com/connect/xd_arbiter.php?version=45
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
staticxx.facebook.com
:scheme
https
:path
/connect/xd_arbiter.php?version=45
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
content-encoding
br
content-type
text/html; charset=utf-8
strict-transport-security
max-age=15552000; preload
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Tue, 19 Jan 2021 01:21:11 GMT
cache-control
public,max-age=31536000,immutable
x-fb-debug
WJae4ZyzrgMscR8s850gEni5BCuLJTZ9B2FZbh8xcmtYWeR5YbTq4G6Z56FqUY/fvoaNoU4zm4mg+Cb0W3BUjQ==
content-length
12351
x-fb-trip-id
1850256238
date
Tue, 21 Jan 2020 13:57:29 GMT Tue, 21 Jan 2020 13:57:29 GMT
alt-svc
h3-24=":443"; ma=3600
status
www.facebook.com/x/oauth/
0
0
Fetch
General
Full URL
https://www.facebook.com/x/oauth/status?client_id=360028941603&input_token&origin=1&redirect_uri=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&sdk=joey&wants_cookie_data=true
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/
Origin
https://www.genbeta.com

Response headers

pragma
no-cache
x-fb-debug
xvGIZata5BlN2fxh24+kTZF+cgPPvwyvlf+u3KReS1aDhkMMXSbgqH+2hRP1N6U/dXYo68BdjyagUIaOULiUNw==
fb-s
unknown
status
200
date
Tue, 21 Jan 2020 13:57:29 GMT, Tue, 21 Jan 2020 13:57:29 GMT
strict-transport-security
max-age=15552000; preload
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-expose-headers
fb-s
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-24=":443"; ma=3600
content-length
0
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
graph.facebook.com/
156 B
613 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&method=get&pretty=0&sdk=joey&suppress_http_code=1
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/es_ES/all.js?hash=a67232079f1a1db63059328e6223b466&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
743b662ee5c1080429fc4e26af7f0b829e95c236167466479a348b2ab5a53a52
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

strict-transport-security
max-age=15552000; preload
etag
"b6a8171c6e8566d59355f74569c9e39030ea1986"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
1001623320
alt-svc
h3-24=":443"; ma=3600
content-length
156
pragma
no-cache
x-fb-debug
xVlMpIXoaJN82E1M9buXRkciTzNbxmO4TuC8cPQx2gXtrptKy9pQXoHl3r5Mkq93Zlc2oIBxEokc4fP+o3vGSQ==
x-fb-trace-id
E7ivFz3gngh
date
Tue, 21 Jan 2020 13:57:29 GMT, Tue, 21 Jan 2020 13:57:29 GMT
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
x-fb-request-id
AdgmFJgsL1n9BrX8vwGJS1s
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.11
expires
Sat, 01 Jan 2000 00:00:00 GMT
syndication
syndication.twitter.com/i/jot/
43 B
337 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1579615049591%2C%22dnt%22%3Afalse%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
117
pragma
no-cache
last-modified
Tue, 21 Jan 2020 13:57:29 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
9d275d361c0f73cc1d32c0404935945b
x-transaction
00ec29b00062df21
expires
Tue, 31 Mar 1981 05:00:00 GMT
tweets.json
cdn.syndication.twimg.com/
7 KB
2 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/tweets.json?callback=__twttr.callbacks.cb0&ids=1217495681230954506&lang=es&suppress_response_codes=true&theme=light&tz=GMT%2B0100
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A3) /
Resource Hash
a114aed475c6723ae2f472da3ef7c0e337f02ad8bed6c4afdb4129b526f563cc
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
40
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
1767
x-xss-protection
0
x-response-time
130
last-modified
Tue, 21 Jan 2020 13:56:49 GMT
server
ECS (fcn/41A3)
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=60
x-connection-hash
4d0639e86cc34e98083c5675e1aba308
accept-ranges
bytes
timing-allow-origin
*
x-transaction
004e58680052aa34
expires
Tue, 21 Jan 2020 13:58:29 GMT
tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
platform.twitter.com/css/
52 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash
5a9b0bcc0e7274386f0f560595519d66ee86bfccf57e76f2e59a6985091fa3a2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:37:57 GMT
Server
ECS (fcn/41AD)
Age
1004727
Etag
"7a92a961c027712f349e184a0eafdd76+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11516
tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
platform.twitter.com/css/
52 KB
52 KB
Image
General
Full URL
https://platform.twitter.com/css/tweet.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:37:57 GMT
Server
ECS (fcn/41AD)
Age
1004727
Etag
"7a92a961c027712f349e184a0eafdd76+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11516
Y8ZMw5bX_normal.png
pbs.twimg.com/profile_images/1104435625065922560/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1104435625065922560/Y8ZMw5bX_normal.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4199) /
Resource Hash
671c6ea4947184712008aff5d0d4a932c447caf52f38b5fec1da41a0024b5438
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
age
165117
x-cache
HIT
status
200
content-length
1883
x-response-time
124
surrogate-key
profile_images profile_images/bucket/8 profile_images/1104435625065922560
last-modified
Sat, 09 Mar 2019 17:33:47 GMT
server
ECS (fcn/4199)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
6522c30e1e48cc0883caf57ce4211c9d
accept-ranges
bytes
EOVp2G6WkAAH867
pbs.twimg.com/media/
19 KB
20 KB
Image
General
Full URL
https://pbs.twimg.com/media/EOVp2G6WkAAH867?format=jpg&name=360x360
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4195) /
Resource Hash
80425682e60844c09aa2f54600090b013306814583fde0138705388b53a29917
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
age
506382
x-cache
HIT
status
200
content-length
19841
x-response-time
338
surrogate-key
media media/bucket/9 media/1217495652562800640
last-modified
Wed, 15 Jan 2020 17:13:58 GMT
server
ECS (fcn/4195)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
bec1b7b8cf543303b0cfdcc598f5a881
accept-ranges
bytes
EOVp2HOWoAIC756
pbs.twimg.com/media/
16 KB
16 KB
Image
General
Full URL
https://pbs.twimg.com/media/EOVp2HOWoAIC756?format=jpg&name=360x360
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D8) /
Resource Hash
b6413062d977eca6bb8370fdcbd468c0035683c62be0090b207c3667a05f209c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
x-content-type-options
nosniff
age
506452
x-cache
HIT
status
200
content-length
16447
x-response-time
483
surrogate-key
media media/bucket/6 media/1217495652646690818
last-modified
Wed, 15 Jan 2020 17:13:58 GMT
server
ECS (fcn/40D8)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2c75de3ceffe25f016321c8c91cd8174
accept-ranges
bytes
truncated
/
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4468e35646c229b518e5f398c5a3d6b15ba1351a71ef22692129bb32f5030ac0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0341a4478ce861ef85c819b913fa0a2501836a6a2ffda8643e95e39f4a2a7de0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
512 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49c2a3cf0f363bf387c06a35a4a4e6c7255799b3776bed55914862136d783028

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
600 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c50a17e8272b9359e4b62e0f305e201f359cb5bd2245671c115d031f2b7f68d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
323 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c3531ed2c934e5daee80955db42a0245d666131e6322c6ec6985992922520ab4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
jot
syndication.twitter.com/i/
43 B
125 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22widget_origin%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%22%2C%22widget_frame%22%3Afalse%2C%22widget_site_screen_name%22%3A%22genbeta%22%2C%22widget_creator_screen_name%22%3A%22tonienblanc%22%2C%22item_ids%22%3A%5B%221217495681230954506%22%5D%2C%22item_details%22%3A%7B%221217495681230954506%22%3A%7B%22item_type%22%3A0%7D%7D%2C%22unbucketed%22%3Atrue%2C%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1579615049724%2C%22dnt%22%3Afalse%2C%22client_version%22%3A%22a383441%3A1578551069153%22%2C%22format_version%22%3A1%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22section%22%3A%22subject%22%2C%22component%22%3A%22tweet%22%2C%22action%22%3A%22results%22%7D%7D
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
111
pragma
no-cache
last-modified
Tue, 21 Jan 2020 13:57:29 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
9d275d361c0f73cc1d32c0404935945b
x-transaction
008be56400f34e8e
expires
Tue, 31 Mar 1981 05:00:00 GMT
jot.html
platform.twitter.com/ Frame 216A
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A9) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://www.genbeta.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
1004728
Cache-Control
public, max-age=315360000, stale-while-revalidate=30
Content-Type
text/html; charset=utf-8
Date
Tue, 21 Jan 2020 13:57:30 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Thu, 09 Jan 2020 22:50:11 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/41A9)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 21 Jan 2020 13:57:30 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 21 Jan 2020 13:57:29 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
9d275d361c0f73cc1d32c0404935945b
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
110
x-transaction
00ff73f200e8f7e9
x-tsa-request-body-time
1
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
500_333.jpeg
i.blogs.es/3d36f6/3/
39 KB
39 KB
Image
General
Full URL
https://i.blogs.es/3d36f6/3/500_333.jpeg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
582af47f7fe654e5b44639eee1a45b61fd4cb33a5d38dfb12b8c281607db8ca7

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 15 Jan 2020 10:02:22 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Tue, 08 Oct 2019 08:27:27 GMT
server
AmazonS3
age
532509
etag
"5e1a5d5064ee1c6351aba0e7f1303f81"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
39814
x-amz-cf-id
LTHotuWOJGkn78G855K1en3wK8REqfDDu8JGdcsZAlqZ-WfU3tE4Yw==
500_333.jpg
i.blogs.es/0a71b8/elementary-os/
50 KB
50 KB
Image
General
Full URL
https://i.blogs.es/0a71b8/elementary-os/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
15b67922c5e90b9f3dd6e65e5899482a213819166e832e9bd11e786223b51829

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 13 Jan 2020 04:30:20 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Wed, 08 Jan 2020 13:30:23 GMT
server
AmazonS3
age
725231
etag
"0d414b3bc568a483654efe25955e23c2"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
51289
x-amz-cf-id
th4FryBS-lWKXm2Fg9wCdK1K7iBZ1SqYeIFVt2qjjatIN7DsDX4ndg==
500_333.jpg
i.blogs.es/3bb160/microsoft-4417277_1920/
34 KB
34 KB
Image
General
Full URL
https://i.blogs.es/3bb160/microsoft-4417277_1920/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
0619cd10f1f764278579ccea5db0b66d90b39da385b56faa3a11e499b699101c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 20 Jan 2020 12:56:06 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Mon, 20 Jan 2020 11:30:41 GMT
server
AmazonS3
age
90085
etag
"eec760276905f9c58442c81fdcb35a84"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
34677
x-amz-cf-id
v6J841Foe3oslbamQvdelIzNpTqljN2NVQ5zFwmq03gr3SUqsOUYaQ==
500_333.jpg
i.blogs.es/46da8a/freddie-marriage-vschpa-ya_a-unsplash/
22 KB
23 KB
Image
General
Full URL
https://i.blogs.es/46da8a/freddie-marriage-vschpa-ya_a-unsplash/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2f6072493a0ecc6886682a9fbe0d760719caf869128a819230cce67f543766fe

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 19 Jan 2020 21:28:40 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Fri, 10 Jan 2020 11:51:50 GMT
server
AmazonS3
age
145731
etag
"8a881cf1d01ca3212f3a1f712c584c8b"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
22701
x-amz-cf-id
gRp3WsQIHEh6ePSiTrrHpPOFjRjLgMubnyjfJlDhr43-imTmKRq9jg==
500_333.jpg
i.blogs.es/ec411d/chrome/
28 KB
29 KB
Image
General
Full URL
https://i.blogs.es/ec411d/chrome/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
e6319a15ca1bd8e18111c313cffc1c13e0d05a3bddded8464fe315dbb332d72e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 11:02:52 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Wed, 06 Nov 2019 13:06:52 GMT
server
AmazonS3
age
10479
etag
"7a2ec55570d0ee1edadd7c6b3b6e3015"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
29132
x-amz-cf-id
5YBRJ51ekbM-4ysR0KnKh_bpy4ZuDYCfmgyr8SnukD5mOaJ5khLx4w==
500_333.jpg
i.blogs.es/34c6a9/electronic-security/
48 KB
49 KB
Image
General
Full URL
https://i.blogs.es/34c6a9/electronic-security/500_333.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
25c7d5f0370f08c813022bf489099e864e748ef15665af66d0fd390d318803c5

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Mon, 23 Dec 2019 19:23:37 GMT
server
AmazonS3
x-amz-cf-pop
FRA53
etag
"2bdcd4a8199ce57c398c165715011aa3"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=32000000
accept-ranges
bytes
content-length
49420
x-amz-cf-id
0K7Q1shs-KWhaXnwTMA9UerDU7nHTPvUe108WFSgBHg-Bh5HfA8-nQ==
500_333.png
i.blogs.es/fd3402/utorrent-bittorrent/
97 KB
97 KB
Image
General
Full URL
https://i.blogs.es/fd3402/utorrent-bittorrent/500_333.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.155.25 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-155-25.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4034ba5fc9ddd1179f648ffd3ac67af1e2eb2dfb67f3a67405fde0809e0df47b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 11:02:52 GMT
via
1.1 300b920cc4a53d2daec2ba8180596d82.cloudfront.net (CloudFront)
last-modified
Mon, 09 Dec 2019 13:21:47 GMT
server
AmazonS3
age
10479
etag
"8e7b485de6397d0d6d594c2300930e01"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=32000000
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
99209
x-amz-cf-id
JoLZesfeHpwAKhTgDFd539kixMnyzW9eUyXhwg_2H5Kxk3b6zUqJMQ==
ads
securepubads.g.doubleclick.net/gampad/
26 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3516206918371759&correlator=2119676035282331&output=ldjh&impl=fifs&adsid=NT&eid=21065395%2C21063635%2C21064169&vrg=2020011601&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu_parts=1018282%2CGEB-LAT-interior%2CGEB-CEN-interior%2CGEB-CEN2-interior%2CGEB-LAT2-interior%2CGEB-BOT2-interior%2CGEB-TOP-interior%2CGEB-INT-interior%2CGEB-HOOK-interior%2CGEB-INT2-interior&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9&prev_iu_szs=160x600%7C300x250%7C300x600%7C300x1000%2C300x250%7C670x250%7C728x90%7C970x90%7C970x250%7C1000x250%2C300x250%7C670x250%7C728x90%7C970x90%7C970x250%7C1000x250%2C160x600%7C300x250%7C300x600%7C300x1000%2C300x250%7C728x90%2C728x90%7C970x90%7C970x250%7C1000x250%2C1x1%2C1x1%2C1x1&ists=6&prev_scp=amznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7C%7C%7C&eri=1&cust_params=type%3Dpost%26source%3D%26site%3DGEB%26siteSection%3Dpostpage%26mapping%3D%26vertical%3DTechnology%26postId%3D303854%26postUrl%3Dhttps%253A%252F%252Fwww.genbeta.com%252Fseguridad%252Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%26publishDate%3D2020-01-16T15%253A30%253A41%26modifiedDate%3D2020-01-16T16%253A35%253A30%26categories%3Dactualidad%252Cwindows%252Cseguridad%26tags%3Dmicrosoft%252Cgithub%252Cnsa%252Cwindows-10%26videoContent%3D%26partner%3D%26blockLength%3D7&cookie_enabled=1&bc=31&abxe=1&lmt=1579615051&dt=1579615051639&dlt=1579615048609&idt=326&frm=20&biw=1585&bih=1200&oid=3&adxs=1177%2C643%2C643%2C1177%2C643%2C429%2C0%2C0%2C0&adys=835%2C3611%2C6216%2C2222%2C6908%2C263%2C8623%2C8624%2C8623&adks=146516415%2C226713633%2C3758333503%2C3415502118%2C1448882304%2C3253970734%2C505953648%2C3726518922%2C3213885034&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=57&icsg=861812034560&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x616%7C1585x290%7C1585x290%7C300x616%7C1585x266%7C1585x118%7C1585x1200%7C1585x1200%7C1585x1200&msz=300x616%7C1585x266%7C1585x266%7C300x616%7C1585x266%7C1585x118%7C1x-1%7C1x-1%7C1x-1&ga_vid=1973333533.1579615052&ga_sid=1579615052&ga_hid=1509052103&fws=4%2C4%2C4%2C4%2C4%2C0%2C0%2C0%2C0&ohw=1585%2C1585%2C1585%2C1585%2C1585%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
3ab56ae18ad0c5af57641d6d47c161918ad531aaccb1068eb8b536ba51d6bdd1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
6532
x-xss-protection
0
google-lineitem-id
4376375428,4376708081,4376403991,4376386072,-2,4376339713,4946230481,-2,5075350927
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138207640505,138207643007,138207633280,138207641027,-2,138207628486,138258918420,-2,138271338930
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011601.js
securepubads.g.doubleclick.net/gpt/
64 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
547811b7c01a8f67208aca4ed0174bec2379e0c68d4577b1524bbfdc716ace65
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 16 Jan 2020 14:06:36 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24507
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:31 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

/
sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
866 B
614 B
Script
General
Full URL
https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash
eaee572c5b0488b5e7e7d35f682bd76d74e5e416c8e704d20ee83c9d00a810ea

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
Server
nginx/1.14.2
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:0:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dc82de33871a9ed40a5379ed264dd0456d9bf58839286b913231648f527bc72b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 00:14:43 GMT
via
1.1 e1f6fa82d37f125cb361c7c37faf6662.cloudfront.net (CloudFront)
last-modified
Tue, 22 Oct 2019 20:22:52 GMT
server
AmazonS3
age
49369
etag
"f53f55cbab099be3a970b446a66c496a"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
3167
x-amz-cf-id
qLGrji_cm1MiFcfpWLYHPGgeWQZUkfAsDXTvaw5IFweKhN5GACXcZQ==
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 22 Jan 2020 13:57:32 GMT
extra.js
static.sunmedia.tv/SMSdk/extra/weblogs/general/
48 KB
11 KB
Script
General
Full URL
https://static.sunmedia.tv/SMSdk/extra/weblogs/general/extra.js?1579615049492
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
e62700721988cda248e9df162f21fd6427b7858f9250a01eac426855e36bc81d

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:47 GMT
server
nginx
age
425266
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
content-length
11500
p2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=402449864&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=402449864&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_c...
43 B
589 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=402449864&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=4645591&cs_ak_ss=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=402449864&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=4645591&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=94bd3813-9f84-4f72-b389-6d6e4bf4888b&tp=op&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425330
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
d.agkn.com/iframe/8613/ Frame 9760
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=812341093&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Technolgy%20%26amp%3B%20Computer%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:f000:19:fc2c:a140:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

:method
GET
:authority
d.agkn.com
:scheme
https
:path
/iframe/8613/?che=812341093&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Technolgy%20%26amp%3B%20Computer%22%2C%22brd%22%3A%22-1%22%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
content-type
text/html;charset=UTF-8
content-length
481
cache-control
no-cache, must-revalidate
date
Tue, 21 Jan 2020 13:57:31 GMT
expires
Sat, 01 Jan 2000 00:00:00 GMT
p3p
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
pragma
no-cache
server
Apache-Coyote/1.1
set-cookie
ab=0001%3ATWH311j8sNTAoKf1ApT%2FdYmD05YBg555;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAlub_LJbm_ywAAAAAAAg1RAQCADVIBAIA;Max-Age=31536000;domain=agkn.com;path=/
x-cache
Miss from cloudfront
via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-amz-cf-id
vrBek-bwZk-H2oPYtSogFXiqtVbmr_3Bea-A-4qF3cFSm-6eekP1gw==
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
SMPlayer_d.css
static.sunmedia.tv/SMSdk/css/SMVast/
4 KB
1 KB
Stylesheet
General
Full URL
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
194b85c10c911ac7a204d734b732c3b7af39682d9690273d56d0fc808be650a8

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
425329
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
text/css
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
*
content-length
963
267639
search.spotxchange.com/vast/2.0/
67 B
1 KB
XHR
General
Full URL
https://search.spotxchange.com/vast/2.0/267639?VPAID=JS&content_page_url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&cb=672860147&player_width=696&player_height=392&custom_skin=1&ad_volume=0&regs[gdpr]=1&user[consent]=1&schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
185.94.180.124 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
78e958d620d6e40a19e424eee3a9b23932cd9bfa4d7f736442048777d203052d

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
X-SpotX-Timing-Transform
0.000379
X-SpotX-Timing-SpotMarket
0.126192
X-SpotX-Timing-Page-Mux
0.000325
X-SpotX-Timing-Page-Require
0.000493
X-fe
129
Connection
keep-alive
X-SpotX-Timing-Page-Cookie
0.000037
Content-Length
76
X-SpotX-Timing-Page
0.133314
Pragma
no-cache
X-SpotX-Timing-Page-Context
0.000470
Last-Modified
Tue, 21 Jan 2020 13:57:32 GMT
Server
nginx
Cache-Control
no-cache, must-revalidate, post-check=0, pre-check=0
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Vary
Accept-Encoding
X-SpotX-Timing-SpotMarket-Primary
0.061975
Content-Type
text/xml;charset=UTF-8
Access-Control-Allow-Origin
https://www.genbeta.com
X-SpotX-Timing-Page-Misc
0.005403
X-SpotX-Timing-Page-Exception
0.000001
X-SpotX-Timing-SpotMarket-Secondary
0.064217
X-SpotX-Timing-Page-URI
0.000015
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=94bd3813-9f84-4f72-b389-6d6e4bf4888b&tp=req&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425330
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
css
fonts.googleapis.com/
767 B
400 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
b4723b5b14abe7a2062b65bf79b4d5d1e575e786a439e61ff95a38e7e9e140e9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Tue, 21 Jan 2020 13:57:31 GMT
server
ESF
access-control-allow-origin
*
date
Tue, 21 Jan 2020 13:57:31 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:31 GMT
sound-on.png
static.sunmedia.tv/SMSdk/ico/
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
425328
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
fullscreen-on.png
static.sunmedia.tv/SMSdk/ico/
1 KB
2 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/fullscreen-on.png
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
7a000f38eb0e9764341b690ff8c931c309a4392e7b35c157652864658ab406eb

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
425328
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
1351
accept-ranges
bytes
x-device
desktop
skip.png
static.sunmedia.tv/SMSdk/ico/
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/skip.png
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
47fd77ed50c61b270cf73b6b71c5ae29d7b46023ea1e3d2f646858d839c927bb

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:02 GMT
server
nginx
age
425328
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2761
accept-ranges
bytes
x-device
desktop
adlabel.png
static.sunmedia.tv/SMSdk/ico/
1 KB
2 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/adlabel.png
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
4cf86b8273ac1a15c23684145f8035a0e3c9d67942f62cb44bb8b95bd7465877

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
425328
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
1359
accept-ranges
bytes
x-device
desktop
play.png
static.sunmedia.tv/SMSdk/ico/
1 KB
2 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/play.png
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
dd4473796fb0eda44798d1802b139e99b54cdf783a2df05f0be684481238c151

Request headers

Referer
https://static.sunmedia.tv/SMSdk/css/SMVast/SMPlayer_d.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:31 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:14:48 GMT
server
nginx
age
425328
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
1525
accept-ranges
bytes
x-device
desktop
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=8&c2=21892462&c3=1001000630&ns__t=1579615052027&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubier...
  • https://sb.scorecardresearch.com/b2?c1=8&c2=21892462&c3=1001000630&ns__t=1579615052027&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubie...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=8&c2=21892462&c3=1001000630&ns__t=1579615052027&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=8&c2=21892462&c3=1001000630&ns__t=1579615052027&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
855c843c-c46c-46a8-994a-d0500eeecff5
vast.sunmedia.tv/creatives/
1 KB
701 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/855c843c-c46c-46a8-994a-d0500eeecff5
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
8e3194a6bf96d447a6e3d867e9d185b37bedc8b7e94eda83c1de94aac757ee08

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
/
sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/ Frame 1CFE
0
0
Document
General
Full URL
https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=331018&pubconsent=1&euconsent=1&hasConsent=1
Requested by
Host: sync.richaudience.com
URL: https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash

Request headers

Host
sync.richaudience.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Server
nginx/1.14.2
Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Encoding
gzip
855c843c-c46c-46a8-994a-d0500eeecff5.js
creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/ Frame C58D
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
a0d5546ce119affaaa50a99bdfaa74694692790ead83bf8a0b276865e31052f0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 08 Jan 2020 12:15:25 GMT
server
nginx
age
425329
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35878
view
securepubads.g.doubleclick.net/pcs/ Frame 24A7
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss-vebMxTWyoePlO3fZ9WblknXkgUQJVZ3jkgsgDz84cmsqt9PdWpDP-u2gu-IL0RcwnGxEsvaDhX9oBwGiDqPctvKCQpbWfMvJNdr8t5fy7FE2uqxyasS6My3APBoeaPqa5IdeuW4v3LC-kZoyLASUegcaBAZS8pGRFGliVZsOp7cu263BaSvaVoTuhtbZy6MU_ZCohbcQc8iNRNviMKdJ1lbhk46fdXNOZ2oBS0PmxkziQSsUwErEg-SGmiq68E8h2HkaQf7XSTCYMg&sai=AMfl-YSj5wCEbJ2349wvVXaKMm_mXx8_25p_Wre1YOaalROEWTClV8r5l8t8Nj8botQqeMvgJf_n6WkB-89E9Wtk0JP-0mBqquj7gapTjAJh&sig=Cg0ArKJSzG_U_RZnNV5qEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
rtg.js
s.richaudience.com/ Frame 24A7
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 24A7
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame B470
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv9lJkhMKjRcfeMFYp5v2XsI4Re67AFbZCLxosAbVTGgPl-cgSjhi-5Dk-bYJ6WhTLrMdS0E5yNzZ8cyu20MIjLOKGfwC0-fxNE2-9ckRN20lkTmpi98qgCQujzJUlrFiNceYiLRSy8MEqD5HMkXgk8vPZnwbeEFs_y2g7FSyJxrnaxQEUo0CKz_x7fvQe3EueBFPDsALLZKgM2g3Ryjtwe12DL6otdYcYHljULetePVvUVqYMp5pSo0jF8tP72h20S9yK-WTab9u6VGQ&sai=AMfl-YSxIzMN3DIWR_nTt1hLvAJ3YoWPyFNCW9XqmId3D6Us4TDeXSqdbYWoCUDFHMH9p8wMgw1vNoNbdmU95bMasqLXyqcyUGZMyOEi38HH&sig=Cg0ArKJSzMIR5dZQEFfTEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
rtg.js
s.richaudience.com/ Frame B470
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame B470
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 463C
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstms3Xd-zLVqNwxAlhCiaq5h_d9xFQ9-quXcySOinHLM8iXqcPxOnkbVJjIU4WLT4i9ne3IF3sQUjY-95gDm2C8aEei8K-I8nc9bVzZBbqFbvykkOifm08lqIjGoO40cg5W14-LiGIxBwm5DGKK33bJd-pGwQyp2ZfWrV9NUZ1n3dqPkh1LaEtWn8w4sPkzAdLLhXznAc8WuyX7q8IxR2csWAMFl-ts4BppXcY6melRPFBtnVcDoDDnd1MGpNBdIWBeU0FyYwVI4JP7Iw&sai=AMfl-YRHYzTvyDmsvpFeFa6Nlksq4ZGjOnUD-QCEvNPyPn6yk3vXXjUyVEfthi1NxSoA9u4965jGTWKiuZC3XIORJiwJHHBGaaXT5T69EEz0&sig=Cg0ArKJSzGoaSUEHZbtGEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
rtg.js
s.richaudience.com/ Frame 463C
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 463C
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 4E13
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsveLj7yQAQTZeTHTwRAPJpkamKLTr9Ucyw0D7yR35rk8X-Cq2Kh25H9TmSafZ22r7o0BPaJv3PTOEqXlf92Us4x1hdp66G10OHUzzMBx3-q1smrLBNHryv7kdhma0OyWKAa5kJNCQaIncmc6TlbXNvTldjuNHBvVwTNmZG5bR0kzCe_w4Kas5KyWvI2WRiEcQ-kwWdsT1g6VlDIf-brVk4uiHv-9UJbdWgV75Pox3D9dT01B2EOa-oZRUNGWBEp-0OhVOB04zFgb8jAcdg&sai=AMfl-YR9LrNchXpJftA3cGt1oLlB2vBzCB1M7MMWSwXoW0ZhMx-3htdRKnN6OpWusx4iZE60yx9wZ3UnnTM2PvMTb4e1ORXjEZz-sc26G5PU&sig=Cg0ArKJSzBAI_ndLsGsVEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
rtg.js
s.richaudience.com/ Frame 4E13
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 4E13
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame B048
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssNJfC-3-rJZEQDAxegu9k1LDN41KCxXN38NMNnllYikUlZBTV9iEd6OGoP7eG4FPjEiVDa-EhIYy7T67Vui_oNX8W-lNq7JJIXQbga7fADsYq6gC7D9AZgJ-TaxvRpRGs36J-NvWolIeVSHrEUCuYZfAWVaTZL7wxt5xE9nsYHzvwJ46yFeGWI10Eq3Jp6_q7YY_Pk-mcTEgFehrXeWrpmo8ILgUHnQQPWGEJTPX6DTUQajQZce3Fm1TCMEtoeAh8lCvikIjyOoGCEaA&sai=AMfl-YQY1gxqBz-yXwmtNULSxyZib-ZfUkTkLOhT2sARe4PggfvXPKvqbUe6XFaoccYnt6r4Zck5NjQIGcmb8_rInJhlRoRsDwThS5DqnSQ9&sig=Cg0ArKJSzAGyEXBgaDZBEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
rtg.js
s.richaudience.com/ Frame B048
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame B048
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
5baf737f-da12-4681-9454-c2f95ffccda1.js
static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/
Redirect Chain
  • https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvzSY93TZxERa769FxhjUD0qfKvZsU-i-yLyn5X6dvdAdDIPVlSlBTVhaTc6D3F2Ov-X27tneztFXaYlxmn_qOfR-V3Q9rctqkr1T2Xp9PPmi0c_H2UYL0ZxISwcVkY2lOZBYMeteoZu...
  • https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
158 KB
42 KB
Script
General
Full URL
https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
703e694165f09ec10c460d71b0428e95bebd81db21eb8918ddab1cf4673e215b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Fri, 10 Jan 2020 09:05:04 GMT
server
nginx
age
425297
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592001
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
42916

Redirect headers

date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
content-type
text/html; charset=UTF-8
server
cafe
access-control-allow-origin
*
location
https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
truncated
/ Frame 5C5F
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
02f1ed6d6d58b4e712d5d08d453c73e7c0ea75ac755ea0e1e75d81868d302f1c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 1A7E
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssQ-176TvoXIMHCApXabaEP7tS6t0GH-ox05ajFMzky2LHe_LUDWqZX6tMSng7Gly784BwglBmS1dXAxg3q32RnitznAcOisRlOO54uPtp37Twe4zIqfqui4wVJh18BVoFkwZn4mDzDePOGSP3ENNrs8qHsvkfJ47CJHKs7iDYW6GxiVUV1fcxaj5D2rjqOmpbkZU2UoQbjQnaRsjmcVHsvBLwdRPyEI5auyh7l2GpeMNcMZ-EzmmAVJ1AYPKBDx7vuU750_9_kAkY&sai=AMfl-YRNY2kUUh4wrLBxtWF2CYrL8dLAH9ytLFddL1zVZIbUMzlweNmleZUNxwUkHFxjgHEcxO5kqW7W3eZlMTRS7QAxxZ9BvFeuq5HFBCAY&sig=Cg0ArKJSzKWFWj8DFDmvEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
/
s.richaudience.com/mgc/0pk1yTLOmb/ Frame 1A7E
3 KB
1 KB
Script
General
Full URL
https://s.richaudience.com/mgc/0pk1yTLOmb/?ord=920633465&hasConsent=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
7b1e92aef4e2c65ca4b502410bdc81a872eb3b5c8cb8c6e57695573541e4bd06

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 1A7E
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
60 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=3516206918371759&r=160x600%7C300x250%7C300x600%7C300x1000&w=160&h=600
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=3516206918371759&r=728x90%7C970x90%7C970x250%7C1000x250&w=1000&h=40
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:32 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame 463C
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6d8491ad07f81cf323d53236dec171f8f18a0170acfbe27849b974af96d6a396

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/Z8ESoglTAn/ Frame BA4E
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
db41837dd16c51401673acc7e7854b69ad0cf3b8d9ee3b38173d30df4c3a9e3a

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame 24A7
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a866ee45c131a7d4b97904fa7fd024f60501fe455849e0260553afae9a8fa679

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/0PLEmFvsNc/ Frame 6653
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
e85b38e7520c89063bc7c58e41784d0927574cf86aadde5282a5f3abacd32284

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame B470
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6d5c95614b0fed471477166daf9bd41acd63d94b39000c32f4eedbdfc43b978a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/1R8nVe8Ta9/ Frame E52D
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d87e0d5e8e5e1a7455620a790b34497094f2c50d182aa3fc687487bde549fb7e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame B048
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0aef7a45eb3231e11f7c3766592705b205bb1eb4bf9a7a162717bb0be2e51d38

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/KHBtcc0SeM/ Frame 09B0
18 KB
5 KB
Script
General
Full URL
https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
7291113c09e771bba90ccf59ff540de171c67b322a65eba8ae44c4d02ea54f58

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
truncated
/ Frame 4E13
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8f5528bec97b0753ba904aee42c22cef1521801d3695478ae2ab772fdb97b03f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
country.php
services.sunmedia.tv/geotarget/
16 B
260 B
XHR
General
Full URL
https://services.sunmedia.tv/geotarget/country.php
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.91.154.17 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3158246.ip-51-91-154.eu
Software
nginx /
Resource Hash
61eae0480dcc464beb4cd150bf5b44a5e0654919abd845f74fbadf913876f1af

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
tp-cache
HIT
server
nginx
age
337402
vary
Accept-Encoding
content-type
application/json
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
access-control-allow-origin
https://www.genbeta.com
content-length
16
inhome-1-0.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
3 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/inhome-1-0.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.68.35.185 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3128584.ip-51-68-35.eu
Software
nginx /
Resource Hash
086a531cdcde16e63f40598b4553dc6be92acaf9f62e51c867cdaef29ac441ef

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
tp-cache
HIT
last-modified
Mon, 30 Dec 2019 14:24:09 GMT
server
nginx
age
97031
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
2577
accept-ranges
bytes
x-device
desktop
outstream.json
static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/
3 KB
4 KB
XHR
General
Full URL
https://static.sunmedia.tv/SMSdk/tracker/8254f813-df2e-4a55-b37f-75555aee94e8/outstream.json
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.68.35.185 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3128584.ip-51-68-35.eu
Software
nginx /
Resource Hash
c7ef7c6a54790c868c5d7e400a17a922f3d646fe8a47d98db133070da6a5fe34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
tp-cache
HIT
last-modified
Wed, 18 Dec 2019 21:20:23 GMT
server
nginx
age
97031
status
200
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, s-maxage=2592000
content-length
3403
accept-ranges
bytes
x-device
desktop
adblockDetector.js
static.sunmedia.tv/SMSdk/assets/AdBlockDetection/
13 KB
5 KB
Script
General
Full URL
https://static.sunmedia.tv/SMSdk/assets/AdBlockDetection/adblockDetector.js
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
4984c39b03cddab1198a70add535b4600ac615d3e938edbec8d2d8b53b9f0a60

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:16 GMT
server
nginx
age
425329
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
x-device
desktop
accept-ranges
bytes
content-length
4831
cert.js
rosetta.richmediastudio.com/c/590d66a7e033eb2197da79fe9a594ddc/
11 KB
2 KB
Script
General
Full URL
https://rosetta.richmediastudio.com/c/590d66a7e033eb2197da79fe9a594ddc/cert.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/mgc/0pk1yTLOmb/?ord=920633465&hasConsent=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.222.198.105 Paris, France, ASN16276 (OVH, FR),
Reverse DNS
ip105.ip-92-222-198.eu
Software
nginx/1.6.2 /
Resource Hash
6e346ae1bd971e9383706871c9b1c9e5989e2e299705bde15ade09a86e6301b2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:48:19 GMT
Content-Encoding
gzip
Last-Modified
Wed, 30 Oct 2019 15:11:21 GMT
Server
nginx/1.6.2
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
close
truncated
/ Frame 1A7E
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d64a748861b6f7eed8a31f330c8c123ec23a8b16f432a40b5a0fe144b3c3c901

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ads.js
s.richaudience.com/srv/0QWIUh3Mr5/ Frame 37A9
21 KB
6 KB
Script
General
Full URL
https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
ac0ea3f2ef4d5350b8aab4fe34517c96235ecc4e0ef9c9a7fbe6c04552d8e79e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame BA4E
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
56174f7fea4166dde15d20ae501625013253e60d073d650b0ba8c8e624d7b386
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 22 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16135
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
beacon.js
sb.scorecardresearch.com/ Frame BA4E
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/Z8ESoglTAn/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 22 Jan 2020 13:57:32 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame 6653
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
3eed9c5b479459f610b8ae4fe63a449fd2a107111dc922a41ea193e183ef3b38
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 104 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
beacon.js
sb.scorecardresearch.com/ Frame 6653
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0PLEmFvsNc/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:57:32 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame E52D
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
3eed9c5b479459f610b8ae4fe63a449fd2a107111dc922a41ea193e183ef3b38
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 301 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
beacon.js
sb.scorecardresearch.com/ Frame E52D
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/1R8nVe8Ta9/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 22 Jan 2020 13:57:32 GMT
b
sb.scorecardresearch.com/ Frame BA4E
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615052774&ns_c=UTF-8&ns_if=1&cv=3.1&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame 37A9
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
3eed9c5b479459f610b8ae4fe63a449fd2a107111dc922a41ea193e183ef3b38
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 968 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
beacon.js
sb.scorecardresearch.com/ Frame 37A9
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/0QWIUh3Mr5/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 22 Jan 2020 13:57:32 GMT
b
sb.scorecardresearch.com/ Frame 6653
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615052779&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
b
sb.scorecardresearch.com/ Frame E52D
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615052783&ns_c=UTF-8&ns_if=1&cv=3.1&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.nl/adsid/ Frame BA4E
109 B
778 B
Script
General
Full URL
https://adservice.google.nl/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame BA4E
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame BA4E
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
fetch_frame_2020011301.html
ff.doubleclick.net/tag/js/ Frame FB22
0
0
Document
General
Full URL
https://ff.doubleclick.net/tag/js/fetch_frame_2020011301.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
ff.doubleclick.net
:scheme
https
:path
/tag/js/fetch_frame_2020011301.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUmk450Hb4WFXgGat7lcuetgZq7gHUblr4vQVzQo0yHpu73ADxfG0IsZgi5y
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
6460
date
Tue, 21 Jan 2020 12:38:55 GMT
expires
Wed, 20 Jan 2021 12:38:55 GMT
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
4717
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
integrator.js
adservice.google.nl/adsid/ Frame 6653
109 B
171 B
Script
General
Full URL
https://adservice.google.nl/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 6653
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 6653
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame 09B0
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
3eed9c5b479459f610b8ae4fe63a449fd2a107111dc922a41ea193e183ef3b38
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 135 of 1000 / last-modified: 1579540009"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16140
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
beacon.js
sb.scorecardresearch.com/ Frame 09B0
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/srv/KHBtcc0SeM/ads.js?raiDbg=false&wscs=1600&hscs=1200&tscs=1920000&inw=1600&inh=1200&wou=1600&hou=1200
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:32 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 22 Jan 2020 13:57:32 GMT
integrator.js
adservice.google.nl/adsid/ Frame E52D
109 B
171 B
Script
General
Full URL
https://adservice.google.nl/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame E52D
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_modern_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame E52D
148 KB
56 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
68cd548aa29feb4fa1f4cd0daa2ad241ce4526ba2570b753785435be4fe6331f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
57387
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
b
sb.scorecardresearch.com/ Frame 37A9
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615052815&ns_c=UTF-8&ns_if=1&cv=3.1&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.nl/adsid/ Frame 37A9
109 B
171 B
Script
General
Full URL
https://adservice.google.nl/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 37A9
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 37A9
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
b
sb.scorecardresearch.com/ Frame 09B0
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=22005840&c3=4695708832912984114&gdpr=true&gdpr_consent=&ns__t=1579615052835&ns_c=UTF-8&ns_if=1&cv=3.1e&c8=&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:32 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame BA4E
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame BA4E
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

rtg.js
s.richaudience.com/
14 KB
3 KB
Script
General
Full URL
https://s.richaudience.com/rtg.js
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/mgc/0pk1yTLOmb/?ord=920633465&hasConsent=1
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
8293d92c3c55385993fcf16dc38ea3953b401b065ed619c8bba5199ca78e9e7c

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
last-modified
Tue, 29 Oct 2019 22:18:37 GMT
server
nginx/1.10.3
etag
W/"5db8babd-388d"
vary
Accept-Encoding
content-type
application/javascript
status
200
integrator.js
adservice.google.nl/adsid/ Frame 09B0
109 B
171 B
Script
General
Full URL
https://adservice.google.nl/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 09B0
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 09B0
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
2fd3899fa327925b33fcb6e2ef324bcbf1abc9b2cb9634f8ebc6bd7ff78b6322
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61968
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
ads
securepubads.g.doubleclick.net/gampad/ Frame 6653
5 KB
2 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=469758698776323&correlator=484833192027157&output=ldjh&impl=fif&adsid=NT&eid=21062415%2C21062899&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2F0PLEmFvsNc&sz=728x90%7C970x250%7C1x1%7C1x1&scp=raiFrmt%3D728x90%26raiPlcmnt%3D0PLEmFvsNc%26plc_avw%3D20%26raiHou%3D26%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D038ba6a5615e40a6%3AT%3D1579615051%3AS%3DALNI_MYaw0IYTBkVEgBGTKZolyARC0wwAA&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615052&dt=1579615052911&dlt=1579615052693&idt=212&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=643&ady=4113&adk=3750205645&uci=gcdf02obzvoi&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x90&msz=0x90&ga_vid=2054156325.1579615053&ga_sid=1579615053&ga_hid=1575319416&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
296e5b66c4838e2e15136ccaa68126d9ffbdda7b70539da15ed8d0f7d5f4173c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2240
x-xss-protection
0
google-lineitem-id
36603597
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
59297929317
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 6653
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 6653
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/ Frame E52D
5 KB
2 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4110775046523738&correlator=4179840199157447&output=ldjh&impl=fif&adsid=NT&eid=21065316%2C21065318&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2F1R8nVe8Ta9&sz=728x90%7C970x250%7C970x90%7C1x1%7C1x1&scp=raiFrmt%3D728x90%26raiPlcmnt%3D1R8nVe8Ta9%26plc_avw%3D60%26raiHou%3D66%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D038ba6a5615e40a6%3AT%3D1579615051%3AS%3DALNI_MYaw0IYTBkVEgBGTKZolyARC0wwAA&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615052&dt=1579615052947&dlt=1579615052706&idt=219&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=293&ady=261&adk=867554721&uci=2k5n6lfnt2mj&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x90&msz=0x90&ga_vid=105533890.1579615053&ga_sid=1579615053&ga_hid=576018624&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
f098112978229512157a926619ca4a086848e85d5f33373dfe717882de82214f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2437
x-xss-protection
0
google-lineitem-id
36613197
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
59297937717
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_modern_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame E52D
61 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2020011301.js?21065316
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
884b6fccd46557ef3c27fb33d5b8125436c6e04225af8d90cc33aeb8d5ee8fdc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24270
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame E52D
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/ Frame 37A9
5 KB
2 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1318973831458043&correlator=79446806843667&output=ldjh&impl=fif&adsid=NT&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2F0QWIUh3Mr5&sz=728x90%7C970x250%7C970x90%7C1x1%7C1x1&scp=raiFrmt%3D728x90%26raiPlcmnt%3D0QWIUh3Mr5%26plc_avw%3D0%26raiHou%3D39%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D038ba6a5615e40a6%3AT%3D1579615051%3AS%3DALNI_MYaw0IYTBkVEgBGTKZolyARC0wwAA&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615052&dt=1579615052965&dlt=1579615052739&idt=219&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=643&ady=6701&adk=622523489&uci=69htoywbq77a&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x90&msz=0x90&ga_vid=541800269.1579615053&ga_sid=1579615053&ga_hid=918507649&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e544b8a5e1b819aeb384e619be663a7dd27a0d0f4baf601d7fbe115b09292c40
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2434
x-xss-protection
0
google-lineitem-id
36606717
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
59297937717
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 37A9
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:32 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 37A9
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads.js
s.richaudience.com/hi/1zJTYRzk06/
4 B
126 B
Script
General
Full URL
https://s.richaudience.com/hi/1zJTYRzk06/ads.js?rnd=56694595&sw=1600&sh=1200&ipmref=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&hasConsent=1
Requested by
Host: s.richaudience.com
URL: https://s.richaudience.com/rtg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
94.130.242.231 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.231.242.130.94.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
server
nginx/1.10.3
vary
Accept-Encoding
content-type
application/javascript
ads
securepubads.g.doubleclick.net/gampad/ Frame 09B0
5 KB
2 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=133363698783137&correlator=3099680299014019&output=ldjh&impl=fif&adsid=NT&eid=21065304&vrg=2020011301&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F17192557%2FKHBtcc0SeM&sz=300x250%7C300x600%7C1x1%7C1x1&scp=raiFrmt%3D300x250%26raiPlcmnt%3DKHBtcc0SeM%26plc_avw%3D60%26raiHou%3D52%26raiType%3D3%26raiStid%3D235&eri=1&cookie=ID%3D038ba6a5615e40a6%3AT%3D1579615051%3AS%3DALNI_MYaw0IYTBkVEgBGTKZolyARC0wwAA&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615053&dt=1579615053012&dlt=1579615052713&idt=294&ea=0&frm=23&biw=1585&bih=1200&oid=3&adx=1247&ady=2138&adk=3651211567&uci=kid6hi1gfxbi&ifi=1&ifk=1203913250&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=2&iag=15&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=674&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x250&msz=0x250&ga_vid=917829763.1579615053&ga_sid=1579615053&ga_hid=868860070&fws=260&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
fd3cf3c663988cc3d7372061832ccedbd009265aeac953ae1dab030a4e211eec
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2247
x-xss-protection
0
google-lineitem-id
36609837
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
59297935077
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011301.js
securepubads.g.doubleclick.net/gpt/ Frame 09B0
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
dafea9f7076ad2b1d3996eb94c7256bfd9b1f29c2c7ee8bd386332c14e12fc4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 14:10:22 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24439
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 09B0
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

view
securepubads.g.doubleclick.net/pcs/ Frame E945
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvJIvT56ZJTYRVCmRp4weJOGN4QnkcC9V1WWC3n9xuGakJEvyzO9TJvnFJZqeyKelsWEdwj8ugOLMWvBFj69WbP5ySmGwHuWlTUzqAjS57_PpvW3MqKyzqzH4YMfoK0bR4oErODMVspFrC3emrROG_UxEQpxv0GXlgplSlb5NEBnQy4hAV_4Q2fWfcLZy_jGK56zVqlV1gSi_jVUoz1qkQDQYWnKi8WvKHSC-YWtmhJ0dniNyPaK9N1xp16sVepS5Nb99Vg8g&sig=Cg0ArKJSzM3bs7D_1fZ_EAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:33 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame E945
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
osd.js
www.googletagservices.com/activeview/js/current/ Frame 6653
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame B5F5
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv9lrwYPM5E6zevnpX36oCdK6tJ_nigEKmgYQNIGPV8MGaXhwqDo4z8OhjDT27pPYUj4g623QjTKw9CiTaOP2kXc9j_AIynfl8yDd5hjx9cIJwSU-FAU06KMiBIMadDNNshxxUG5N4Zimg9nXgY5hZ0QMc-QbBFMWoVBJKwFgfEiVuFS2YTLBUC7OEgvW1hB1F0XQgug2T5Atv5NEfLJYis9PYCjuhSRo9F6HZAmyKDpJzlKg6F7ZBDaMvtWmzzzxLkxH3rkA&sig=Cg0ArKJSzFwNnzx0rsilEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:33 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame B5F5
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
osd.js
www.googletagservices.com/activeview/js/current/ Frame 37A9
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame AB86
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssXe16OCxkcmni0YmM12NsHENBVkpc-WZmZPgnuNajCJn-cGhcIJ0omgwr2_H6KmpnFMbVQWMbRCXS0DxZx1YsF1WWERpu_O50uqTJm_ySmkAsG4KdMu0FsuXy7LhPrvwpPhzDraFIsomSlurVEBcqwKsE8S2WNzZ7UXsSZUFM9Ms1upro00GWln7V6Ies_yuowvm-JAyggGki2T7WrzxOvfMgT_WVU3qrhNLPm6ff277r9OJWeH8pcf85xss6kqtQ9oizJ8Q&sig=Cg0ArKJSzPQTp_0vfSACEAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:33 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame AB86
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_rendering_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
osd.js
www.googletagservices.com/activeview/js/current/ Frame E52D
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2020011301.js?21065316
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2b376ba30591d9b5032046507f61ca59f0b7b9170b7fb927f64d6c009aa9ffc9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579522920574147"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28079
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
truncated
/ Frame E945
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fe8517db28fbfc30e37f431c8bb55d98fe1240041cbcf2c94aa9eec4b043f97f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame B5F5
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3f6677ec078253eeb3538ed1fccb1f7c88e722fc5ae5c2b971840a2cc6641528

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame AB86
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
cd98f45608a51db28d44f14fd3c2a5613f6a737b13c247cf23bdd5e33ac3349d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 6B1E
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsveIA6z01Cu0McGViOiXYFInuk-uli9UIWo1NbAw1Hhu38nLvvirmKgTSnH1GoS_NF_0YwvYExkx9C9Be4-1gAP7FZkM8eaDkd-jTgosZqqyp2rOOzYqN76vSsxIPdefd0AYzebwp-gZAjHT4NH6f7grkGTNQTBhmoVrDpI1DBn6rtVc0A7c6IdS6mPZAF53h_YEVQfdgzWGH5JHtheQbZ-rIeSHPmTVCoKdRhk7tTM1ZXgYJMxxVPJA7aWhfeKQ87bYawDGA&sig=Cg0ArKJSzNfYreYVRuy-EAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:33 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 6B1E
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
osd.js
www.googletagservices.com/activeview/js/current/ Frame BA4E
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 4DD6
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsupuVZ1HWnPOQ61g-BZCF05OgnADXUdxt6wiV3d7VbzfNOeuqwa-ae8PLHxITZkgWgaWCHXSBMBkuEBNULPPUBZq7bhT1PCPQpYvHHdwpaIQs-8DsKZNP96ustJ4TGB60nu6b6pOrdpCGk3o-p928maCclIKHL9mjiko7I5AiGUqgoiOgXmTQ91hZVq-j7bRtfBE-jhoRF4PIga7sPS_rEETaB0pc7ifrfUwx2hqzf1SmZ9smDngMjTa5Sto0SYx4LSMDEvYw&sig=Cg0ArKJSzMiXMNmdrqm_EAE&urlfix=1&adurl=
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:33 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
gpt.js
www.googletagservices.com/tag/js/ Frame 4DD6
52 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8822a9d24093dfe6831458dc8d1dec2af6830052aa05ac33f22c972065f9f37
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"404 / 409 of 1000 / last-modified: 1579540049"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16148
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 4DD6
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
09f123f44ea215f1123eac7a936b4cf940740ab87bb38e7f74b0fdbf049b747d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27810
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
osd.js
www.googletagservices.com/activeview/js/current/ Frame 09B0
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a2217ce1c5cb8571a4ac742a321f5dbb323fb93132bcb11c7fcec751ac338e89
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579273895063399"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28056
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame 14DB
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
425330
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
indisplay_general_ava.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame 14DB
896 B
659 B
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
012fc52dc8464e217227a5e7ffb217786966db23b38d5ef8a6ca46e8f051b9ae

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
503
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
424
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame C58D
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=SMAdFactory
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425332
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame C58D
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=adl
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425332
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
truncated
/ Frame 6B1E
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3afbec9613d5be98c085e3f4e01a7bd28818ac72949162a7e3c91c87c5a27b3f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
pubads_impl_2020011601.js
securepubads.g.doubleclick.net/gpt/ Frame 4DD6
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
54c05d108ce5e65e51412d1667e583e90a8d22233e33e78deea09b903530a0e4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 16 Jan 2020 14:06:36 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61850
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
integrator.sync.js
adservice.google.de/adsid/ Frame 4DD6
113 B
178 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=www.genbeta.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
108
x-xss-protection
0
smart.js
ced.sascdn.com/tag/1999/ Frame 14DB
24 KB
10 KB
Script
General
Full URL
https://ced.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.105 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-105.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
98fc00528a207dee025a6c14d3b5ddea456fe2a07a10cf88ff197e1cf1057141

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:33 GMT
Content-Encoding
gzip
Cache-Control
public, max-age=166
Content-Length
10143
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
ads
securepubads.g.doubleclick.net/gampad/ Frame 4DD6
41 KB
10 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2842350987567030&correlator=3468029139112170&output=ldjh&impl=fif&eid=21065395&vrg=2020011601&npa=1&guci=1.2.0.0.2.1.0.0&sc=1&sfv=1-0-37&ecs=20200121&iu=%2F1018282%2Fpassback-lat2%2FGEB&sz=300x600%7C300x250&eri=2&cookie=ID%3D038ba6a5615e40a6%3AT%3D1579615051%3AS%3DALNI_MYaw0IYTBkVEgBGTKZolyARC0wwAA&cdm=www.genbeta.com&bc=31&abxe=1&lmt=1579615053&dt=1579615053698&dlt=1579615053529&idt=159&ea=0&frm=23&biw=1585&bih=1200&isw=300&ish=250&oid=3&adx=1177&ady=1532&adk=2339551171&uci=g33e6dmercw5&ifi=1&ifk=2264157717&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=3&iag=63&url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&top=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&dssz=7&icsg=10&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x600&msz=300x600&ga_vid=1245952656.1579615054&ga_sid=1579615054&ga_hid=734000431&fws=256&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
4597542bef4f4595f21c5ebbd824150b0ff03d42037611ad8dbd9094f022fc17
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com

Response headers

date
Tue, 21 Jan 2020 13:57:34 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10376
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020011601.js
securepubads.g.doubleclick.net/gpt/ Frame 4DD6
64 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
547811b7c01a8f67208aca4ed0174bec2379e0c68d4577b1524bbfdc716ace65
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 16 Jan 2020 14:06:36 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24507
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:33 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 4DD6
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=3
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

truncated
/ Frame 4DD6
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5119ceba5812ae7f0438298d9d2a8ee7d5190ccdaabaeb8b2bc3cbb75e9d593

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ac
www8.smartadserver.com/ Frame 14DB
22 B
2 KB
Script
General
Full URL
https://www8.smartadserver.com/ac?nwid=1999&siteid=281855&pgid=1039313&fmtid=70691&async=1&visit=m&tmstp=3935193739&tag=sas_70691&sh=1200&sw=1600&pgDomain=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&noadcbk=sas.noad
Requested by
Host: ced.sascdn.com
URL: https://ced.sascdn.com/tag/1999/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.43 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
3850020bf3d555d772316cf9a0dd1a07f374aed3fd305e667b69c812adc0ebf3

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:34 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
X-SMRT-D
3%3b8%3b73
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Cache-Control
no-cache, no-store
Content-Type
application/javascript; charset=utf-8
Content-Length
140
Expires
-1
v2
es-sunelespanol.videoplaza.tv/proxy/distributor/
59 KB
4 KB
XHR
General
Full URL
https://es-sunelespanol.videoplaza.tv/proxy/distributor/v2?s=RONIT/Desktop&tt=p&rt=vast_2.0&rnd=838176523&pf=fl_11&dcid=pc&xpb=1&gdpr=1&gdpr_consent=1&ru=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&vht=392&vwt=696&cp.schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.28.138.9 , Sweden, ASN197541 (VIDEOPLAZA-AS, SE),
Reverse DNS
Software
/
Resource Hash
b763da43386a8c8c4ae8d86548b037ff1bcbf963c38723f85395eef81a5cbb16

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:34 GMT
content-encoding
gzip
status
200
vary
Origin, Accept-Encoding
content-type
text/xml;charset=utf-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
expires
Thu, 01 Jan 1970 00:00:00 GMT
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=err
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:34 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425333
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
ima3vpaid
tpc.googlesyndication.com/
828 B
680 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=${randoml}&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fiu%3D%2F260217354%2Fmarca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26tfcd%3D0%26npa%3D0%26sz%3D300x250%257C320x180%257C320x240%257C540x360%257C640x360%257C640x480%257C720x576%257C768x576%257C1280x720%26gdfp_req%3D1%26output%3Dvast%26unviewed_position_start%3D1%26env%3Dvp%26vpos%3Dpreroll%26vpmute%3D0%26vpa%3D0%26type%3Djs%26nofb%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1667b318382d28a5d309727ccc58c7c8cd7b7fe61e862326486301de5c409a80
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
531
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame B3B3
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:34 GMT
amp4ads-host-v0.js
cdn.ampproject.org/rtv/011912050130240/ Frame 4DD6
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b0e077c071d8cadd7f559a3bfba9b136c071a5a0bc7cb6d952171b5f427cfa11
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
732
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7140
x-xss-protection
0
server
sffe
date
Tue, 21 Jan 2020 13:45:22 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d61e8113ad0598ef"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Jan 2021 13:45:22 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/011912050130240/ Frame 03F0
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0289758c8c964fbe0ec421527203b54fa728f037f3e023b002691158c82d7f98
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
742
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55703
x-xss-protection
0
server
sffe
date
Tue, 21 Jan 2020 13:45:12 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"5d665c0313f255e6"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Jan 2021 13:45:12 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 03F0
15 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-ad-exit-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b388700842c722b76892ae257a262436a354966566be5fc2fc06dcb7a006d49d
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
53735
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5590
x-xss-protection
0
server
sffe
date
Mon, 20 Jan 2020 23:01:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"725cf1b04be851c6"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Jan 2021 23:01:59 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 03F0
152 KB
41 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ab99b94ce42722a9b966906754075df92c870cb9ff1aa1c48920008806079153
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
724
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
41415
x-xss-protection
0
server
sffe
date
Tue, 21 Jan 2020 13:45:30 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"66b88e0b1300c1e3"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Jan 2021 13:45:30 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 03F0
3 KB
1 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-fit-text-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
627128aa43dc242642c6d678f53ebface174b2a3a3de58522b644fd5c61c5f67
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
53774
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1398
x-xss-protection
0
server
sffe
date
Mon, 20 Jan 2020 23:01:20 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"0b9648fcbc3c015a"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Jan 2021 23:01:20 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 03F0
45 KB
14 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-form-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
816ec7f0b489b0fd32872606d9458c49ac0d3f3fcbb901bd0a38f797d2eb14b1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
53732
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14335
x-xss-protection
0
server
sffe
date
Mon, 20 Jan 2020 23:02:02 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"e120bec091dd60ce"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Jan 2021 23:02:02 GMT
truncated
/ Frame 03F0
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0427672b2edc21d889d33550deca85f2cdebff02833c6c4dfa58ae5807e37485

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
759360227186773258
tpc.googlesyndication.com/simgad/ Frame 03F0
92 KB
92 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/759360227186773258?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qmCKEVF1Q633BgEFeVDuOd9ID1jTQ
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2399005bcbf9d5e25eba3806e4db9b5053aae32807989ba0ea3545dcc682a1c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 00:50:42 GMT
x-content-type-options
nosniff
last-modified
Tue, 12 Nov 2019 15:57:32 GMT
server
sffe
age
47212
content-type
image/png
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
94208
x-xss-protection
0
expires
Wed, 20 Jan 2021 00:50:42 GMT
es.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 03F0
3 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/es.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
f86391f8f5e12c3838b2bb51d1910da2a1a2aa975e44bfc3e189dc8bccdc0549
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 11:10:30 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
10024
etag
15820072736840818134
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2687
x-xss-protection
0
expires
Wed, 22 Jan 2020 11:10:30 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 03F0
295 B
425 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 11:08:48 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
10126
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
295
x-xss-protection
0
expires
Wed, 22 Jan 2020 11:08:48 GMT
l
www.google.com/ads/measurement/ Frame 03F0
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSvj15vPQSPMxhFOVa4P4c523SkgddqtV9iNJ-tNieBa3BSMBuD64Pus_e2A9NqwQGEnWOo
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:32::75 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

adview
securepubads.g.doubleclick.net/pagead/ Frame 03F0
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CDiF-TQMnXvjOLcaB-gam46igCsPqiKpb2Pe52fIKloLNhYgWEAEghPOLImCRhICAiBigAeCAt4EDyAECqQI4e3jXPpyyPuACAKgDAcgDCKoE1wJP0F2mnmkDc5Da1d6NWlSP0uWuE1yM-MG29nkcqK7IuXNVPzi5dIZl_mCtlySviqtdcyJbD_14G87Y8DHUNLMneocSIeOnNtfPNUSlhGD8HOv6u7YAHSfYWYpKAl_ff-3A-8l85XNtvcZmDezkJ51pt3BWg1ZjbSOlpe2hKaar2fIP8KBEhI8NYg9smJ0LtgvbEiaPgivPthxWV1L-0ec9QS3y2qZv_8XgbYXmqSTw96d8ybi4XrdMQu-lFDYVDDVAAO-ALUlE0v4Qt8A0u94UsRZ3vf6H7Bs9De76Ozfw12GXGCqaAgbHV5l5gDuRvTGLzQv_Kq7qtbonSWUffkDb2UBAxww6qPEgO707G1Hv7PoYQgJ0CJchJ6qag2eBCrtvXhn0WW-ZL84JwRy2CdhUZ7uiRCTT3vqlsdGM6vjmpni31xwPtEVDekR45epuO0mR-1gU1MXYwAT48cK8-QHgBAGSBQQIBBgBkgUECAUYBKAGAoAHiP_IfqgHjs4bqAfVyRuoB5PYG6gHugaoB_LZG6gHpr4bqAfs1RvYBwHyBwQQzOkH0ggJCIDhgHAQARgfgAoDyAsB2BMM&sigh=nd3ahOWk4LI&tpd=AGWhJmuJlK4CFYMUpF5tLHXPVwmGr_jxzUhRdel0fkk9y_co_w
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame B3B3
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:34 GMT
amp4ads-host-v0.js
cdn.ampproject.org/rtv/011912050130240/ Frame 09B0
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b0e077c071d8cadd7f559a3bfba9b136c071a5a0bc7cb6d952171b5f427cfa11
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
732
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7140
x-xss-protection
0
server
sffe
date
Tue, 21 Jan 2020 13:45:22 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d61e8113ad0598ef"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Jan 2021 13:45:22 GMT
amp4ads-host-v0.js
cdn.ampproject.org/rtv/011912050130240/
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020011601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b0e077c071d8cadd7f559a3bfba9b136c071a5a0bc7cb6d952171b5f427cfa11
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
732
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7140
x-xss-protection
0
server
sffe
date
Tue, 21 Jan 2020 13:45:22 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d61e8113ad0598ef"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Jan 2021 13:45:22 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 03F0
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Redirect headers

date
Tue, 21 Jan 2020 13:57:34 GMT
x-content-type-options
nosniff
server
safe
location
https://googleads.g.doubleclick.net/pagead/drt/si
content-type
text/html; charset=UTF-8
status
302
cache-control
private
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
246
x-xss-protection
0
/
sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
867 B
616 B
Script
General
Full URL
https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash
1e9d48d132a94f37914e56e35537531fa1d278efdf9ffb8a60cb67fe6b75a6f1

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:35 GMT
Content-Encoding
gzip
Server
nginx/1.14.2
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:0:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dc82de33871a9ed40a5379ed264dd0456d9bf58839286b913231648f527bc72b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 00:14:43 GMT
via
1.1 e1f6fa82d37f125cb361c7c37faf6662.cloudfront.net (CloudFront)
last-modified
Tue, 22 Oct 2019 20:22:52 GMT
server
AmazonS3
age
49373
etag
"f53f55cbab099be3a970b446a66c496a"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
3167
x-amz-cf-id
_vfwI4GD49zxxE8LDnEn0k04N4ffkAKCcwQp2sov55XiMs-NNj8D8Q==
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:35 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 22 Jan 2020 13:57:35 GMT
207956
search.spotxchange.com/vast/2.0/
67 B
1 KB
XHR
General
Full URL
https://search.spotxchange.com/vast/2.0/207956?VPAID=JS&content_page_url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&cb=232197441&player_width=420&player_height=236&custom_skin=1&ad_volume=0&regs[gdpr]=1&user[consent]=1&schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
185.94.180.124 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
78e958d620d6e40a19e424eee3a9b23932cd9bfa4d7f736442048777d203052d

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:35 GMT
Content-Encoding
gzip
X-SpotX-Timing-Transform
0.000526
X-SpotX-Timing-SpotMarket
0.091639
X-SpotX-Timing-Page-Mux
0.000222
X-SpotX-Timing-Page-Require
0.000392
X-fe
098
Connection
keep-alive
X-SpotX-Timing-Page-Cookie
0.000039
Content-Length
76
X-SpotX-Timing-Page
0.096203
Pragma
no-cache
X-SpotX-Timing-Page-Context
0.000380
Last-Modified
Tue, 21 Jan 2020 13:57:35 GMT
Server
nginx
Cache-Control
no-cache, must-revalidate, post-check=0, pre-check=0
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Vary
Accept-Encoding
X-SpotX-Timing-SpotMarket-Primary
0.044293
Content-Type
text/xml;charset=UTF-8
Access-Control-Allow-Origin
https://www.genbeta.com
X-SpotX-Timing-Page-Misc
0.002995
X-SpotX-Timing-Page-Exception
0.000001
X-SpotX-Timing-SpotMarket-Secondary
0.047346
X-SpotX-Timing-Page-URI
0.000009
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p
sb.scorecardresearch.com/
43 B
589 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=21892462&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=976678808&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=6200137
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:35 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=5baf737f-da12-4681-9454-c2f95ffccda1&tp=op&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:35 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425334
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=5baf737f-da12-4681-9454-c2f95ffccda1&tp=req&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:35 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425334
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smptf&it=5baf737f-da12-4681-9454-c2f95ffccda1&tp=ef&pb=1&pos=no-pos&loop=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:35 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425334
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
d.agkn.com/iframe/8613/ Frame 6DC0
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=430529686&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Business%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:f000:19:fc2c:a140:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

:method
GET
:authority
d.agkn.com
:scheme
https
:path
/iframe/8613/?che=430529686&gdpr=&gdpr_consent=&ref=&bpid=sunmedia&c=%7B%22bpid%22%3A%22sunmedia%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Business%22%2C%22brd%22%3A%22-1%22%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
cookie
u=C|0AEAlub_LJbm_ywAAAAAAAg1RAQCADVIBAIA; ab=0001%3ATWH311j8sNTAoKf1ApT%2FdZQYVLC1oR44HcXJu2ftvkf2%2BckuCuflfw%3D%3D
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
content-type
text/html;charset=UTF-8
content-length
481
cache-control
no-cache, must-revalidate
date
Tue, 21 Jan 2020 13:57:35 GMT
expires
Sat, 01 Jan 2000 00:00:00 GMT
p3p
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
pragma
no-cache
server
Apache-Coyote/1.1
set-cookie
ab=0001%3ATWH311j8sNTAoKf1ApT%2FdZQYVLC1oR44HcXJu2ftvkf2%2BckuCuflfw%3D%3D;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAlub_LJbm_zwAAAAABAg1RAQEADVIBAQA;Max-Age=31536000;domain=agkn.com;path=/
x-cache
Miss from cloudfront
via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-amz-cf-id
oJyIgjbObtb0LS76ABEjDiihpoxkt5vbLmIGNebXsCzbQLIUcG1WGA==
b
sb.scorecardresearch.com/
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=8&c2=21892462&c3=1001000630&ns__t=1579615055141&ns_c=UTF-8&cv=3.1&c8=Demuestran%20c%C3%B3mo%20puede%20ser%20explotada%20la%20grave%20vulnerabilidad%20descubierta%20en%20Windows%2010%20%27rickrolleando%27%20la%20supuesta%20web%20de%20la%20NSA&c7=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:35 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
/
sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/ Frame 50F8
0
0
Document
General
Full URL
https://sync.richaudience.com/dcf3528a0b8aa83634892d50e91c306e/?ord=1208317&pubconsent=1&euconsent=1&hasConsent=1
Requested by
Host: sync.richaudience.com
URL: https://sync.richaudience.com/DF2886F390D432DF0C8E98D69702ED6F/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.69.76.252 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.252.76.69.159.clients.your-server.de
Software
nginx/1.14.2 /
Resource Hash

Request headers

Host
sync.richaudience.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

Server
nginx/1.14.2
Date
Tue, 21 Jan 2020 13:57:35 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Encoding
gzip
855c843c-c46c-46a8-994a-d0500eeecff5
vast.sunmedia.tv/creatives/
1 KB
701 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/855c843c-c46c-46a8-994a-d0500eeecff5
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
8e3194a6bf96d447a6e3d867e9d185b37bedc8b7e94eda83c1de94aac757ee08

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:35 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
855c843c-c46c-46a8-994a-d0500eeecff5.js
creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/ Frame 718B
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
a0d5546ce119affaaa50a99bdfaa74694692790ead83bf8a0b276865e31052f0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:35 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 08 Jan 2020 12:15:25 GMT
server
nginx
age
425332
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35878
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame 4617
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Mon, 20 Jan 2020 23:40:38 GMT
expires
Tue, 19 Jan 2021 23:40:38 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
51417
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame B3B3
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:35 GMT
integrator.js
adservice.google.com/adsid/ Frame B3B3
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
truncated
/ Frame B3B3
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame B3B3
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=75259403&id=ima_html5&c=2451861065396089&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:35 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
267639
search.spotxchange.com/vast/2.0/
67 B
1 KB
XHR
General
Full URL
https://search.spotxchange.com/vast/2.0/267639?VPAID=JS&content_page_url=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&cb=-408261489&player_width=696&player_height=392&custom_skin=1&ad_volume=0&regs[gdpr]=1&user[consent]=1&schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
185.94.180.124 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
78e958d620d6e40a19e424eee3a9b23932cd9bfa4d7f736442048777d203052d

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:36 GMT
Content-Encoding
gzip
X-SpotX-Timing-Transform
0.000386
X-SpotX-Timing-SpotMarket
0.114013
X-SpotX-Timing-Page-Mux
0.000272
X-SpotX-Timing-Page-Require
0.000586
X-fe
074
Connection
keep-alive
X-SpotX-Timing-Page-Cookie
0.000035
Content-Length
76
X-SpotX-Timing-Page
0.118597
Pragma
no-cache
X-SpotX-Timing-Page-Context
0.000331
Last-Modified
Tue, 21 Jan 2020 13:57:36 GMT
Server
nginx
Cache-Control
no-cache, must-revalidate, post-check=0, pre-check=0
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Vary
Accept-Encoding
X-SpotX-Timing-SpotMarket-Primary
0.061472
Content-Type
text/xml;charset=UTF-8
Access-Control-Allow-Origin
https://www.genbeta.com
X-SpotX-Timing-Page-Misc
0.002962
X-SpotX-Timing-Page-Exception
0.000001
X-SpotX-Timing-SpotMarket-Secondary
0.052541
X-SpotX-Timing-Page-URI
0.000011
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Expires
Thu, 01 Jan 1970 00:00:00 GMT
ima3vpaid
tpc.googlesyndication.com/
779 B
578 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=-1114486153&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26vpos%3Dpreroll%26iu%3D%2F21631112852%2FRevenueMaker_Video%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3D0%26type%3Djs%26unviewed_position_start%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b8e940f70faaedc7fd9f351c65d428bab4440d3e7458ec5324f974b4f92d1357
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
500
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 3EAB
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:36 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 3EAB
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:36 GMT
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame E962
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
425333
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
indisplay_general_ava.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame E962
896 B
659 B
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
012fc52dc8464e217227a5e7ffb217786966db23b38d5ef8a6ca46e8f051b9ae

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
505
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
424
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 718B
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=SMAdFactory
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425335
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 718B
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=adl
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425335
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ced.sascdn.com/tag/1999/ Frame E962
24 KB
10 KB
Script
General
Full URL
https://ced.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.105 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-105.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
98fc00528a207dee025a6c14d3b5ddea456fe2a07a10cf88ff197e1cf1057141

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:36 GMT
Content-Encoding
gzip
Cache-Control
public, max-age=163
Content-Length
10143
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
ac
www8.smartadserver.com/ Frame E962
22 B
1 KB
Script
General
Full URL
https://www8.smartadserver.com/ac?nwid=1999&siteid=281855&pgid=1039313&fmtid=70691&async=1&visit=m&tmstp=2577060387&tag=sas_70691&sh=1200&sw=1600&pgDomain=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&noadcbk=sas.noad
Requested by
Host: ced.sascdn.com
URL: https://ced.sascdn.com/tag/1999/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.43 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
3850020bf3d555d772316cf9a0dd1a07f374aed3fd305e667b69c812adc0ebf3

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
X-SMRT-D
3%3b24%3b111
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Cache-Control
no-cache, no-store
Content-Type
application/javascript; charset=utf-8
Content-Length
140
Expires
-1
cygnus
as-sec.casalemedia.com/
24 B
988 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=311095&v=7.2&r=%7B%22id%22%3A%221c7fab3f9356de%22%2C%22imp%22%3A%5B%7B%22id%22%3A%22298dae0aa21b72%22%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311095%22%2C%22sid%22%3A%22970x250%22%7D%7D%2C%7B%22id%22%3A%22337f974d1b2106%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311095%22%2C%22sid%22%3A%22728x90%22%7D%7D%2C%7B%22id%22%3A%2253359c06f78e3f%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311097%22%2C%22sid%22%3A%22300x600%22%7D%7D%2C%7B%22id%22%3A%22603d354072ca6f%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311097%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%22799b18f527606f%22%2C%22banner%22%3A%7B%22w%22%3A160%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311097%22%2C%22sid%22%3A%22160x600%22%7D%7D%2C%7B%22id%22%3A%2280130e736a4e2e%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311099%22%2C%22sid%22%3A%22300x600%22%7D%7D%2C%7B%22id%22%3A%2297dd003caa24fd%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311099%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%2210270268b7c5644%22%2C%22banner%22%3A%7B%22w%22%3A160%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311099%22%2C%22sid%22%3A%22160x600%22%7D%7D%2C%7B%22id%22%3A%22118ac199a027bf7%22%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311101%22%2C%22sid%22%3A%22970x250%22%7D%7D%2C%7B%22id%22%3A%22139b2c0121f5a22%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311101%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%2214006a6a34a254e%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311101%22%2C%22sid%22%3A%22728x90%22%7D%7D%2C%7B%22id%22%3A%22151a847d0384b76%22%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311103%22%2C%22sid%22%3A%22970x250%22%7D%7D%2C%7B%22id%22%3A%2217efa23a599226b%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311103%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%2218e3461faa1616d%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311103%22%2C%22sid%22%3A%22728x90%22%7D%7D%2C%7B%22id%22%3A%221919e5962a036b2%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311105%22%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%22207cd74d0ce973b%22%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A%22311105%22%2C%22sid%22%3A%22728x90%22%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A0%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
aad7836899a5eeafc99e0a5fa203c09964ee1db319f06744b18d7de4bf238d3b

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Tue, 21 Jan 2020 13:57:36 GMT
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
159.69.67.244 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.244.67.69.159.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
159.69.67.244 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.244.67.69.159.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
159.69.67.244 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.244.67.69.159.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
159.69.67.244 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.244.67.69.159.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
159.69.67.244 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.244.67.69.159.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
/
shb.richaudience.com/hb/
4 B
217 B
XHR
General
Full URL
https://shb.richaudience.com/hb/
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
159.69.67.244 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.244.67.69.159.clients.your-server.de
Software
nginx/1.10.3 /
Resource Hash
d6dffe998d4d52601dd56a1666bbd09f6926bc110429c434402ca7a814080808

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
server
nginx/1.10.3
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.genbeta.com
access-control-max-age
86400
access-control-allow-credentials
true
fastlane.json
fastlane.rubiconproject.com/a/api/
259 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652558&size_id=2&alt_size_ids=57&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=286047ba-d4fb-4353-aaed-c334ebdff9de&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.21351046391449557
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
f44c0d40d23dfe1f00b5ff56baf88dfdb5b1d6fab9261a5fbc220e81843a3a86

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=385
Content-Length
259
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
262 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652562&size_id=15&alt_size_ids=9%2C10&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=8b44a9fd-b80a-4205-85c4-1e4aa91facf5&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.15225297821166373
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
aababe2a6e69a814f318bbe3b30a5e75506f6f55481d31d39e63985bc6519150

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=409
Content-Length
262
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
262 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652566&size_id=15&alt_size_ids=9%2C10&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=c41573ac-2991-40af-accd-53ee2958c9e7&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.42665606617048657
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
5652866c0c74c25195ad4bcbbf32321cc8cd4e5a23590925fd504b62d0249eec

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=308
Content-Length
262
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
262 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652570&size_id=15&alt_size_ids=2%2C57&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=d9d863ac-2e0c-4d43-a32f-5aea39712e1a&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.23216240884632788
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
e0eaef5998bb0dec6337c136d7032fb9dd0804ed8c9005797142317f36a26feb

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=380
Content-Length
262
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
262 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652574&size_id=15&alt_size_ids=2%2C57&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=b944cee2-d7a0-4896-b3f6-fc8118120d14&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.9911554660281781
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
15bfb01fdf15b66e37974b62632a9f0ca3d3fe91e9a00068d594566e9cd2c1a2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=238
Content-Length
262
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
259 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11188&site_id=139474&zone_id=652578&size_id=15&alt_size_ids=2&p_pos=unknown&rf=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&tk_flint=pbjs_lite_v2.28.0&x_source.tid=003a4852-110f-4714-8885-73082e6157e3&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.22892653768972404
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
96dd18eea88fc9e3a58a4200c21630506329eaaa2e6acadf94647a3c81d3cc2f

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=345
Content-Length
259
Expires
Wed, 17 Sep 1975 21:32:10 GMT
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.138.121 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
X-SMRT-D
4%3b11%3b96
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.138.121 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
X-SMRT-D
4%3b11%3b40
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.138.121 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
X-SMRT-D
4%3b22%3b103
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.138.121 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
X-SMRT-D
4%3b15%3b59
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.138.121 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
X-SMRT-D
4%3b3%3b77
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
v1
prg.smartadserver.com/prebid/
0
1 KB
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.138.121 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:36 GMT
X-SMRT-D
4%3b0%3b53
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json
Content-Length
0
Expires
-1
prebid
ib.adnxs.com/ut/v3/
21 B
860 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: www.genbeta.com
URL: https://www.genbeta.com/js/prebidGdpr.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
316.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
aaaabde3f68c325033b37bb3ebff887e3b589b7137e717e96648a52221881429
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:38 GMT
X-Proxy-Origin
85.159.237.66; 85.159.237.66; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.101:80
AN-X-Request-Uuid
d1f58020-71ee-4aea-a079-5539dd78b448
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
21
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
/
track.sunmedia.tv/
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=err
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425335
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
v2
es-sunelespanol.videoplaza.tv/proxy/distributor/
59 KB
4 KB
XHR
General
Full URL
https://es-sunelespanol.videoplaza.tv/proxy/distributor/v2?s=RONIH/Desktop&tt=p&rt=vast_2.0&rnd=407630167&pf=fl_11&dcid=pc&xpb=1&gdpr=1&gdpr_consent=1&ru=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529&vht=236&vwt=420&cp.schain=1.0,1!sunmedia.tv,06bc430c-4bbf-4fe2-9dd1-1fe39a5b9be4,1,,,
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.28.138.9 , Sweden, ASN197541 (VIDEOPLAZA-AS, SE),
Reverse DNS
Software
/
Resource Hash
7b3b5f3918078417ea0a870b2785497797c91da3e09551b7004331f3a307107c

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
status
200
vary
Origin, Accept-Encoding
content-type
text/xml;charset=utf-8
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
expires
Thu, 01 Jan 1970 00:00:00 GMT
ima3vpaid
tpc.googlesyndication.com/
828 B
606 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=${randoml}&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fiu%3D%2F260217354%2Fmarca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26tfcd%3D0%26npa%3D0%26sz%3D300x250%257C320x180%257C320x240%257C540x360%257C640x360%257C640x480%257C720x576%257C768x576%257C1280x720%26gdfp_req%3D1%26output%3Dvast%26unviewed_position_start%3D1%26env%3Dvp%26vpos%3Dpreroll%26vpmute%3D0%26vpa%3D0%26type%3Djs%26nofb%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1667b318382d28a5d309727ccc58c7c8cd7b7fe61e862326486301de5c409a80
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
531
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 58AD
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
age
2
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:34 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 58AD
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fiu%3D/260217354/marca_com_marca_video_instream_video_topsites%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:36 GMT
truncated
/ Frame 3EAB
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame 3A33
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Mon, 20 Jan 2020 23:40:38 GMT
expires
Tue, 19 Jan 2021 23:40:38 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
51419
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 3EAB
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:37 GMT
integrator.js
adservice.google.com/adsid/ Frame 3EAB
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 3EAB
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&id=ima_html5&c=2120557327622828&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
855c843c-c46c-46a8-994a-d0500eeecff5
vast.sunmedia.tv/creatives/
1 KB
701 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/855c843c-c46c-46a8-994a-d0500eeecff5
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
8e3194a6bf96d447a6e3d867e9d185b37bedc8b7e94eda83c1de94aac757ee08

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:37 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
855c843c-c46c-46a8-994a-d0500eeecff5.js
creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/ Frame FE53
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
a0d5546ce119affaaa50a99bdfaa74694692790ead83bf8a0b276865e31052f0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:37 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 08 Jan 2020 12:15:25 GMT
server
nginx
age
425334
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35878
truncated
/ Frame 58AD
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame 35F3
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Mon, 20 Jan 2020 23:40:38 GMT
expires
Tue, 19 Jan 2021 23:40:38 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
51419
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 58AD
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:37 GMT
integrator.js
adservice.google.com/adsid/ Frame 58AD
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 58AD
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=189176001&id=ima_html5&c=1933365595599275&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ima3vpaid
tpc.googlesyndication.com/
779 B
575 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=-414163960&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26vpos%3Dpreroll%26iu%3D%2F21631112852%2FRevenueMaker_Video%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3D0%26type%3Djs%26unviewed_position_start%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b8e940f70faaedc7fd9f351c65d428bab4440d3e7458ec5324f974b4f92d1357
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
500
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 459D
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
age
2
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:36 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 459D
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:38 GMT
/
track.sunmedia.tv/ Frame FE53
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=SMAdFactory
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:38 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425337
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame 8217
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:38 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
425335
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
indisplay_general_ava.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame 8217
896 B
659 B
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
012fc52dc8464e217227a5e7ffb217786966db23b38d5ef8a6ca46e8f051b9ae

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:38 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
507
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
424
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame FE53
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=adl
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:38 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425337
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ced.sascdn.com/tag/1999/ Frame 8217
24 KB
10 KB
Script
General
Full URL
https://ced.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.105 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-105.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
98fc00528a207dee025a6c14d3b5ddea456fe2a07a10cf88ff197e1cf1057141

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:38 GMT
Content-Encoding
gzip
Cache-Control
public, max-age=161
Content-Length
10143
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
ac
www8.smartadserver.com/ Frame 8217
22 B
1 KB
Script
General
Full URL
https://www8.smartadserver.com/ac?nwid=1999&siteid=281855&pgid=1039313&fmtid=70691&async=1&visit=m&tmstp=8419925578&tag=sas_70691&sh=1200&sw=1600&pgDomain=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&noadcbk=sas.noad
Requested by
Host: ced.sascdn.com
URL: https://ced.sascdn.com/tag/1999/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.43 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
3850020bf3d555d772316cf9a0dd1a07f374aed3fd305e667b69c812adc0ebf3

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:39 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
X-SMRT-D
3%3b0%3b142
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Cache-Control
no-cache, no-store
Content-Type
application/javascript; charset=utf-8
Content-Length
140
Expires
-1
truncated
/ Frame 459D
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame CB08
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Mon, 20 Jan 2020 23:40:38 GMT
expires
Tue, 19 Jan 2021 23:40:38 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
51421
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 459D
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:39 GMT
integrator.js
adservice.google.com/adsid/ Frame 459D
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 459D
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&id=ima_html5&c=5718713383846&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:39 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
vast.sunmedia.tv/creatives/
1 KB
705 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
4b3b9b9f39fef6bd6e316aa19b37be467dd9e47cd53446279fde3cfc2d5067c1

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:39 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js
creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/ Frame 4D76
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
80b5eb4754c78a4295cab91ff51c2cb2cca1ee0de677aea9e92dee7a95aff95e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:39 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Tue, 14 Jan 2020 12:37:24 GMT
server
nginx
age
425335
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35887
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
vast.sunmedia.tv/creatives/
1 KB
705 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
4b3b9b9f39fef6bd6e316aa19b37be467dd9e47cd53446279fde3cfc2d5067c1

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:39 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js
creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/ Frame F39D
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
80b5eb4754c78a4295cab91ff51c2cb2cca1ee0de677aea9e92dee7a95aff95e

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:39 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Tue, 14 Jan 2020 12:37:24 GMT
server
nginx
age
425335
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35887
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame B8C3
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
425337
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
hb_zhb_generico-caro.js
creatives.sunmedia.tv/vpaid_ssp_display/hb/ Frame B8C3
5 KB
2 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
52935733acbfaa83126cdf4a3cc3ba730eaa8903b9be74b1a8dbf2eaed1bf9ac

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
content-type
application/x-javascript
status
200
cache-control
no-cache
access-control-allow-credentials
true, true
x-device
desktop
/
track.sunmedia.tv/ Frame 4D76
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=SMAdFactory
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425339
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 4D76
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=adl
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425339
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ec.sascdn.com/tag/1999/ Frame B8C3
24 KB
10 KB
Script
General
Full URL
https://ec.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.16 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBF) /
Resource Hash
2b75150e90ce1ab05e462c1f9fa3be1b9bf46eb8ca01ace5385ed860ea84c7e2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
content-encoding
gzip
last-modified
Tue, 21 Jan 2020 13:53:06 GMT
server
ECS (amb/6BBF)
age
274
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript; charset=utf-8
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
10130
expires
Tue, 21 Jan 2020 14:02:40 GMT
prebid.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame B8C3
277 KB
88 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
c8a22161e476569199308a717b2d6e775ddd7d50770f7236df3400fcea193317

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
516
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
89279
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame F39D
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=SMAdFactory
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425339
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame 68A5
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
425337
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
hb_zhb_generico-caro.js
creatives.sunmedia.tv/vpaid_ssp_display/hb/ Frame 68A5
5 KB
2 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
52935733acbfaa83126cdf4a3cc3ba730eaa8903b9be74b1a8dbf2eaed1bf9ac

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
content-type
application/x-javascript
status
200
cache-control
no-cache
access-control-allow-credentials
true, true
x-device
desktop
/
track.sunmedia.tv/ Frame F39D
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=adl
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266/video/0434c5d5-6985-4bfb-9d0f-35ffc3cf7266.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425339
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ec.sascdn.com/tag/1999/ Frame 68A5
24 KB
10 KB
Script
General
Full URL
https://ec.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.16 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBF) /
Resource Hash
2b75150e90ce1ab05e462c1f9fa3be1b9bf46eb8ca01ace5385ed860ea84c7e2

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
content-encoding
gzip
last-modified
Tue, 21 Jan 2020 13:53:06 GMT
server
ECS (amb/6BBF)
age
274
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript; charset=utf-8
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
10130
expires
Tue, 21 Jan 2020 14:02:40 GMT
prebid.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame 68A5
277 KB
88 KB
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/hb/hb_zhb_generico-caro.js?xclk=${xclk}&rnd=${random}&gdpr=${gdpr}&gdpr_consent=${gdpr_consent}&referrerurl=${request.referrerurl}&rw=${request.width}&rh=${request.height}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
c8a22161e476569199308a717b2d6e775ddd7d50770f7236df3400fcea193317

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:40 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
516
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
89279
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 4D76
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=0434c5d5-6985-4bfb-9d0f-35ffc3cf7266&tp=vw
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:42 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425341
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
v1
prebid.digitru.st/id/ Frame B8C3
425 B
1 KB
XHR
General
Full URL
https://prebid.digitru.st/id/v1
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:b600:a:d79f:3100:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
bbcee6f0bb59b7ac5433bd500ac8d24950ffcd0cbdd0104bf0120b3a3035c225

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:42 GMT
via
1.1 150f249515041adfcc44683bff172916.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA53
status
200
vary
Accept-Encoding, Origin
access-control-allow-methods
GET, OPTIONS
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
https://www.genbeta.com
cache-control
private, max-age=15552000
access-control-allow-credentials
true
x-cache
LambdaGeneratedResponse from cloudfront
content-type
application/json
content-length
425
x-amz-cf-id
EzKBCMzyn-0efMMnhv5UTbENP3vIBEU8_jmbn4sUFxX9qHgTHmFmJQ==
v1
prebid.digitru.st/id/ Frame 68A5
425 B
1 KB
XHR
General
Full URL
https://prebid.digitru.st/id/v1
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:b600:a:d79f:3100:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
cf5fc2c4c417a53fb4d32589e2ff9363b9e2d233dfd98b5e908113f32a2ef91d

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 21 Jan 2020 13:57:42 GMT
via
1.1 150f249515041adfcc44683bff172916.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA53
status
200
vary
Accept-Encoding, Origin
access-control-allow-methods
GET, OPTIONS
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
https://www.genbeta.com
cache-control
private, max-age=15552000
access-control-allow-credentials
true
x-cache
LambdaGeneratedResponse from cloudfront
content-type
application/json
content-length
425
x-amz-cf-id
cn-efTWQs43WYJLhQEVkPP6ic234pdPK7I1Y2KpaB15b0QuVibRDwQ==
855c843c-c46c-46a8-994a-d0500eeecff5
vast.sunmedia.tv/creatives/
1 KB
701 B
XHR
General
Full URL
https://vast.sunmedia.tv/creatives/855c843c-c46c-46a8-994a-d0500eeecff5
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
8e3194a6bf96d447a6e3d867e9d185b37bedc8b7e94eda83c1de94aac757ee08

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:45 GMT
content-encoding
gzip
tp-cache
MISS
server
nginx
age
0
status
200
access-control-allow-methods
GET
content-type
text/xml
access-control-allow-origin
https://www.genbeta.com
cache-control
no-cache
access-control-allow-credentials
true
x-device
desktop
855c843c-c46c-46a8-994a-d0500eeecff5.js
creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/ Frame 88E7
205 KB
35 KB
Script
General
Full URL
https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
a0d5546ce119affaaa50a99bdfaa74694692790ead83bf8a0b276865e31052f0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:45 GMT
content-encoding
gzip
tp-cache
HIT
last-modified
Wed, 08 Jan 2020 12:15:25 GMT
server
nginx
age
425342
vary
Accept-Encoding
access-control-allow-methods
POST, GET, OPTIONS, PUT, DELETE
content-type
application/javascript
status
200
cache-control
max-age=0, s-maxage=2592000
access-control-allow-credentials
true
x-device
desktop
accept-ranges
bytes
content-length
35878
ima3vpaid
tpc.googlesyndication.com/
1 KB
753 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=-859436544&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Flive%2Fads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D%2F143394101%2Fca-video-pub-8221793852898543-tag%2F3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a03929acb91ca47bbc3536b7107296aadfb3a442eb9f51ff6c71d3bfa44198bb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
674
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 0733
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/live/ads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D/143394101/ca-video-pub-8221793852898543-tag/3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:45 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 0733
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/live/ads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D/143394101/ca-video-pub-8221793852898543-tag/3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:45 GMT
sound-on.png
static.sunmedia.tv/SMSdk/ico/ Frame C444
3 KB
3 KB
Image
General
Full URL
https://static.sunmedia.tv/SMSdk/ico/sound-on.png
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
bdc8974fef203fa0bb84f6488aca9993abe075e703a1edc87c583e71ae855412

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:46 GMT
tp-cache
HIT
last-modified
Wed, 15 Jan 2020 10:15:14 GMT
server
nginx
age
425343
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=0, s-maxage=2592000
content-length
2894
accept-ranges
bytes
x-device
desktop
indisplay_general_ava.js
creatives.sunmedia.tv/vpaid_ssp_display/ Frame C444
896 B
659 B
Script
General
Full URL
https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/855c843c-c46c-46a8-994a-d0500eeecff5/video/855c843c-c46c-46a8-994a-d0500eeecff5.js?xclk=${xclk}
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
012fc52dc8464e217227a5e7ffb217786966db23b38d5ef8a6ca46e8f051b9ae

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:46 GMT
content-encoding
gzip
tp-cache
HIT
server
nginx
age
516
content-type
application/x-javascript
status
200
cache-control
max-age=0, s-maxage=3600s
access-control-allow-credentials
true, true
content-length
424
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 88E7
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=SMAdFactory
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:46 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425345
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
/
track.sunmedia.tv/ Frame 88E7
42 B
278 B
Image
General
Full URL
https://track.sunmedia.tv/?ap=smadf&ce=855c843c-c46c-46a8-994a-d0500eeecff5&tp=adl
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.89.99.150 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3163893.ip-51-89-99.eu
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:46 GMT
tp-cache
HIT
last-modified
Thu, 15 Nov 2018 09:59:07 GMT
server
nginx
age
425345
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=0, s-maxage=31536000
access-control-allow-credentials
true
content-length
42
accept-ranges
bytes
x-device
desktop
smart.js
ced.sascdn.com/tag/1999/ Frame C444
24 KB
10 KB
Script
General
Full URL
https://ced.sascdn.com/tag/1999/smart.js
Requested by
Host: creatives.sunmedia.tv
URL: https://creatives.sunmedia.tv/vpaid_ssp_display/indisplay_general_ava.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.105 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-105.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
98fc00528a207dee025a6c14d3b5ddea456fe2a07a10cf88ff197e1cf1057141

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 21 Jan 2020 13:57:46 GMT
Content-Encoding
gzip
Cache-Control
public, max-age=153
Content-Length
10143
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
ac
www8.smartadserver.com/ Frame C444
22 B
2 KB
Script
General
Full URL
https://www8.smartadserver.com/ac?nwid=1999&siteid=281855&pgid=1039313&fmtid=70691&async=1&visit=m&tmstp=3424710325&tag=sas_70691&sh=1200&sw=1600&pgDomain=https%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa&noadcbk=sas.noad
Requested by
Host: ced.sascdn.com
URL: https://ced.sascdn.com/tag/1999/smart.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.43 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
3850020bf3d555d772316cf9a0dd1a07f374aed3fd305e667b69c812adc0ebf3

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:46 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
X-SMRT-D
3%3b18%3b103
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Cache-Control
no-cache, no-store
Content-Type
application/javascript; charset=utf-8
Content-Length
140
Expires
-1
ima3vpaid
tpc.googlesyndication.com/
779 B
575 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=-969548916&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26vpos%3Dpreroll%26iu%3D%2F21631112852%2FRevenueMaker_Video%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3D0%26type%3Djs%26unviewed_position_start%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b8e940f70faaedc7fd9f351c65d428bab4440d3e7458ec5324f974b4f92d1357
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
500
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame CC7B
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
age
10
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:36 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame CC7B
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:46 GMT
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame E4E8
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Mon, 20 Jan 2020 23:40:38 GMT
expires
Tue, 19 Jan 2021 23:40:38 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
51428
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 0733
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:46 GMT
integrator.js
adservice.google.com/adsid/ Frame 0733
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
truncated
/ Frame 0733
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 0733
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=40819804%2C42530174&id=ima_html5&c=643721269353119&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:46 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ptv
secure.adnxs.com/
85 B
776 B
XHR
General
Full URL
https://secure.adnxs.com/ptv?id=16619481&cb=1845049461&gdpr=1&gdpr_consent=1&vwidth=696&vheight=392&referrer=https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.27 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
539.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
b2effcb18f514a7896e737bdda537f2ef3b5bb989eb247f4ab2aa3facf1148ea
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:49 GMT
X-Proxy-Origin
85.159.237.66; 85.159.237.66; 539.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.173:80
AN-X-Request-Uuid
1e40b5b3-7b70-4f94-a069-ded5bcbec80a
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/xml; charset=utf-8
Content-Length
85
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
ima3vpaid
tpc.googlesyndication.com/
779 B
575 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=-770959229&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Fads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29%26vpos%3Dpreroll%26iu%3D%2F21631112852%2FRevenueMaker_Video%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3D0%26type%3Djs%26unviewed_position_start%3D1
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b8e940f70faaedc7fd9f351c65d428bab4440d3e7458ec5324f974b4f92d1357
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
500
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 01F6
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/94bd3813-9f84-4f72-b389-6d6e4bf4888b/94bd3813-9f84-4f72-b389-6d6e4bf4888b.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
age
11
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:36 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 01F6
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/ads%3Fsz%3D640x480%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:47 GMT
bridge3.360.1_en.html
imasdk.googleapis.com/js/core/ Frame D10B
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.360.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.360.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196429
date
Mon, 20 Jan 2020 23:40:38 GMT
expires
Tue, 19 Jan 2021 23:40:38 GMT
last-modified
Sat, 18 Jan 2020 02:01:35 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
51429
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame CC7B
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:47 GMT
integrator.js
adservice.google.com/adsid/ Frame CC7B
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.genbeta.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
truncated
/ Frame CC7B
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame CC7B
0
49 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?et=object&lid=126&sdkv=h.3.360.1&e=44711678%2C668123728&id=ima_html5&c=4455259600118694&domain
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jan 2020 13:57:47 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ptv
secure.adnxs.com/
85 B
776 B
XHR
General
Full URL
https://secure.adnxs.com/ptv?id=16619481&cb=-1254687073&gdpr=1&gdpr_consent=1&vwidth=420&vheight=236&referrer=https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.27 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
539.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
b2effcb18f514a7896e737bdda537f2ef3b5bb989eb247f4ab2aa3facf1148ea
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 21 Jan 2020 13:57:49 GMT
X-Proxy-Origin
85.159.237.66; 85.159.237.66; 539.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.201:80
AN-X-Request-Uuid
524799b0-c23d-4f6e-bcb3-dc67b1175722
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.genbeta.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/xml; charset=utf-8
Content-Length
85
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
ima3vpaid
tpc.googlesyndication.com/
1 KB
749 B
XHR
General
Full URL
https://tpc.googlesyndication.com/ima3vpaid?vad_format=linear&correlator=-555494890&adtagurl=https%3A%2F%2Fpubads.g.doubleclick.net%2Fgampad%2Flive%2Fads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D%2F143394101%2Fca-video-pub-8221793852898543-tag%2F3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps%3A%2F%2Fwww.genbeta.com%2Fseguridad%2Fdemuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a03929acb91ca47bbc3536b7107296aadfb3a442eb9f51ff6c71d3bfa44198bb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept
*/*
Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
Origin
https://www.genbeta.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 21 Jan 2020 13:57:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://www.genbeta.com
cache-control
private
access-control-allow-credentials
true
content-type
text/xml; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
674
x-xss-protection
0
vpaid_adapter.js
imasdk.googleapis.com/js/sdkloader/ Frame 8132
39 KB
14 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/live/ads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D/143394101/ca-video-pub-8221793852898543-tag/3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%26channel%3Dvastadp
Requested by
Host: static.sunmedia.tv
URL: https://static.sunmedia.tv/integrations/5baf737f-da12-4681-9454-c2f95ffccda1/5baf737f-da12-4681-9454-c2f95ffccda1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f1a56843f6292854dd92340140351e64940bb8fde5c1dbf32cb3d83af9b4945c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 02:04:31 GMT
server
sffe
age
2
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14297
x-xss-protection
0
expires
Tue, 21 Jan 2020 14:12:45 GMT
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 8132
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/vpaid_adapter.js?adtagurl=https://pubads.g.doubleclick.net/gampad/live/ads%3Fsz%3D400x300%7C640x480%26vpos%3Dpreroll%26iu%3D/143394101/ca-video-pub-8221793852898543-tag/3353350710%26env%3Dvp%26gdfp_req%3D1%26output%3Dvast%26tfcd%3D0%26npa%3D0%26vpmute%3D0%26vpa%3Dauto%26type%3Djs%26unviewed_position_start%3D1%26description_url%3Dhttps://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa%3Futm_source%3Dfeedburner%26utm_medium%3Dfeed%26utm_campaign%3DFeed%253A%2Bgenbeta%2B%2528Genbeta%2529%26channel%3Dvastadp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d49519c4d1c8d85ba237847de2eae7b08284ab0c3477c2f15fcdb6a0731f65ea
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 21 Jan 2020 13:57:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93881
x-xss-protection
0
expires
Tue, 21 Jan 2020 13:57:47 GMT

Verdicts & Comments Add Verdict or Comment

183 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate string| country boolean| isSpainOrLatamUser object| googletag object| dataLayer boolean| gdprAppliesGlobally function| refreshAds function| handleClick function| agreeAllOnce function| setUpDidomi function| __cmp object| didomiConfig object| didomiOnReady object| WSL number| PREBID_TIMEOUT object| adUnits object| pbjs object| apstagSlots object| bidders object| requestManager function| _getGPTSlots function| allBiddersBack function| headerBidderBack function| sendAdserverRequest function| requestBids object| apstag object| NREUM object| newrelic function| __nr_require string| didomiCountry object| didomiGeoRegulations object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken function| pbjsChunk object| __core-js_shared__ function| JSEncrypt object| __cmpBuffer boolean| apstagLOADED string| GoogleAnalyticsObject function| __gaTracker object| _comscore object| configs string| keyword object| Didomi function| webpackJsonpDidomi object| core function| setImmediate function| clearImmediate object| didomiEventListeners object| adsbygoogle object| didomiState function| udm_ object| ns_p object| COMSCORE object| google_tag_data object| gaplugins object| gaGlobal object| gaData number| google_srt undefined| google_measure_js_timing number| __google_ad_urls_id number| ConsentforGoogleIs object| WSLModules object| __twttrll object| twttr object| __twttr object| AML object| WSL2 object| webpackJsonpjwplayer function| jwplayer function| jQuery function| $ object| Modernizr object| picturefillCFG function| picturefill function| moment function| _ object| Backbone object| FB object| ExposeTranslation function| WSLCookie function| FuckAdBlock object| fuckAdBlock function| forEach function| detect object| ui string| uAgent object| smdevice string| smuAgent number| SMGDPRKey object| SMIntextPlaylist object| adblockDetector number| google_unique_id string| url number| sm_conscore_rnda number| sm_conscore_rndb string| raEuconsent string| raReferrer object| agkn function| setUpAgknTag object| SMIntext_1579615049492 function| agknTagBuilder object| _agknTag string| _agknTagName object| _agknEchoTag number| _isAgknTagSet object| SMExtraPlgs number| checkSMcontainerWL function| removeSMcontainerWL object| SMcontainerWL object| SMCurrentPlayer string| f number| g function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter string| raConsentString string| raReferrerDomain string| raHasConsent object| raIfSync object| google_image_requests object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| SMInHome boolean| testIframe string| raiEnvIP string| raiEnvUA string| raiEnvCountry string| raiEnvDevice string| raiEnvRef string| raiEnvRefDomain string| raiEnvRandom string| raiCntCSS string| raiCntJS string| hasConsent string| raiCertID string| raiOOPPid0pk1yTLOmb number| rmsSkinSize function| pnetInitSkin object| raiTag function| raiResizeGen object| currentScript string| currentProtocol boolean| isOpera boolean| isFirefox boolean| isSafari boolean| isIE boolean| isEdge boolean| isChrome string| raiTagCmpErrorText object| raiTagCmpError object| scriptSplit object| raiTargetWindow object| raiTargetWindowDocument string| csyncPubConsent string| csyncEuConsent string| csyncHasConsent string| raProtocol object| raiHITag string| raHISrc object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager number| google_global_correlator object| __AMP_LOG object| __AMP_ERRORS boolean| ampInaboxInitialized object| __AMP_MODE function| __AMP_REPORT_ERROR object| AMP object| closure_lm_685728 object| closure_lm_671782 object| closure_lm_240394 object| closure_lm_767965

7 Cookies

Domain/Path Name / Value
.amazon-adsystem.com/ Name: ad-privacy
Value: 0
.amazon-adsystem.com/ Name: ad-id
Value: AyKnAzu_mkM1hzNXHUszLgE
.genbeta.com/ Name: _ga
Value: GA1.2.133335796.1579615049
.genbeta.com/ Name: _gat
Value: 1
.genbeta.com/ Name: _gat_rollUp
Value: 1
.genbeta.com/ Name: _gid
Value: GA1.2.973308409.1579615049
.genbeta.com/ Name: didomi_token
Value: eyJ1c2VyX2lkIjoiMTZmYzg2NGQtNDdmZS02NzdjLWJkOGItNzUwOWNhYzExYWNmIiwiY3JlYXRlZCI6IjIwMjAtMDEtMjFUMTM6NTc6MjguODU0WiIsInVwZGF0ZWQiOiIyMDIwLTAxLTIxVDEzOjU3OjI4Ljg1NFoiLCJ2ZW5kb3JzIjp7ImVuYWJsZWQiOltdLCJkaXNhYmxlZCI6W119LCJwdXJwb3NlcyI6eyJlbmFibGVkIjpbXSwiZGlzYWJsZWQiOltdfX0=

2 Console Messages

Source Level URL
Text
console-api warning URL: https://img.weblogssl.com/LPbackend/prod/v2/js/postpage-cdeb2da9.js(Line 1)
Message:
The Facebook JSSDK is more than 7 days old.
console-api info URL: https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js(Line 412)
Message:
Powered by AMP ⚡ HTML – Version 1912050130240 https://www.genbeta.com/seguridad/demuestran-como-puede-ser-explotada-grave-vulnerabilidad-descubierta-windows-10-rickrolleado-supuesta-web-nsa?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+genbeta+%28Genbeta%29

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

aax-eu.amazon-adsystem.com
ab.blogs.es
adserver.video
adservice.google.com
adservice.google.de
adservice.google.nl
as-sec.casalemedia.com
c.amazon-adsystem.com
cdn.ampproject.org
cdn.syndication.twimg.com
ced.sascdn.com
connect.facebook.net
creatives.sunmedia.tv
d.agkn.com
ec.sascdn.com
es-sunelespanol.videoplaza.tv
fastlane.rubiconproject.com
ff.doubleclick.net
fonts.googleapis.com
googleads.g.doubleclick.net
graph.facebook.com
i.blogs.es
i0.wp.com
ib.adnxs.com
imasdk.googleapis.com
img.weblogssl.com
img.youtube.com
js.agkn.com
pagead2.googlesyndication.com
pbs.twimg.com
platform-lookaside.fbsbx.com
platform.sunmedia.tv
platform.twitter.com
prebid.digitru.st
prg.smartadserver.com
recommendations.weblogssl.com
rosetta.richmediastudio.com
s.richaudience.com
s0.2mdn.net
sb.scorecardresearch.com
sdk-gcp.privacy-center.org
sdk.privacy-center.org
search.spotxchange.com
secure.adnxs.com
securepubads.g.doubleclick.net
services.sunmedia.tv
shb.richaudience.com
static.sunmedia.tv
staticxx.facebook.com
stats.g.doubleclick.net
sync.richaudience.com
syndication.twitter.com
ti.blogs.es
tpc.googlesyndication.com
track.sunmedia.tv
vast.sunmedia.tv
www.facebook.com
www.genbeta.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagservices.com
www.gravatar.com
www8.smartadserver.com
104.244.42.136
159.69.67.244
159.69.76.252
178.33.230.6
185.28.138.9
185.33.223.221
185.86.137.43
185.86.138.121
185.94.180.124
192.0.77.2
2.16.186.105
2001:4860:4802:32::75
216.58.207.66
23.210.249.164
23.45.99.242
2600:1901:0:7dde::
2600:9000:2047:0:15:efbc:e300:93a1
2600:9000:2047:7e00:5:b7cc:d3c0:93a1
2600:9000:2047:b600:a:d79f:3100:93a1
2600:9000:2047:e200:16:9f91:2d80:93a1
2600:9000:2047:f000:19:fc2c:a140:93a1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:59:254c:406:2366:268c
2a00:1450:4001:800::2001
2a00:1450:4001:806::2001
2a00:1450:4001:806::200a
2a00:1450:4001:814::2002
2a00:1450:4001:815::200a
2a00:1450:4001:816::2006
2a00:1450:4001:819::2002
2a00:1450:4001:81a::200e
2a00:1450:4001:81d::2002
2a00:1450:4001:821::2006
2a00:1450:4001:824::2003
2a00:1450:4001:824::200e
2a00:1450:4001:825::2002
2a00:1450:400c:c0c::9a
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f02d:e:face:b00c:0:2
2a03:2880:f12d:83:face:b00c:0:25de
2a04:fa87:fffe::c000:4902
37.252.173.27
51.68.35.185
51.89.99.150
51.91.154.17
52.222.153.194
52.222.155.166
52.222.155.197
52.222.155.25
52.222.155.38
52.222.155.79
52.94.220.16
68.232.35.16
69.173.144.141
92.222.198.105
94.130.242.231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