www.krackattacks.com
Open in
urlscan Pro
2400:cb00:2048:1::681b:a590
Public Scan
Submission: On October 17 via manual from US
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on October 12th 2017. Valid for: 6 months.
This is the only time www.krackattacks.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2400:cb00:204... 2400:cb00:2048:1::681b:a590 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - CloudFlare) | |
1 | 2a00:1450:400... 2a00:1450:4001:825::2008 | 15169 (GOOGLE) (GOOGLE - Google Inc.) | |
2 | 2a00:1450:400... 2a00:1450:4001:825::200e | 15169 (GOOGLE) (GOOGLE - Google Inc.) | |
11 | 4 |
ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US)
www.krackattacks.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
krackattacks.com
www.krackattacks.com |
87 KB |
2 |
google-analytics.com
www.google-analytics.com |
14 KB |
1 |
googletagmanager.com
www.googletagmanager.com |
18 KB |
0 |
youtube-nocookie.com
Failed
www.youtube-nocookie.com Failed |
|
11 | 4 |
Domain | Requested by | |
---|---|---|
7 | www.krackattacks.com |
www.krackattacks.com
|
2 | www.google-analytics.com |
www.googletagmanager.com
www.krackattacks.com |
1 | www.googletagmanager.com |
www.krackattacks.com
|
0 | www.youtube-nocookie.com Failed |
www.krackattacks.com
|
11 | 4 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni68082.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2017-10-12 - 2018-04-20 |
6 months | crt.sh |
*.google-analytics.com Google Internet Authority G3 |
2017-10-03 - 2017-12-26 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://www.krackattacks.com/
Frame ID: 18705.1
Requests: 10 HTTP requests in this frame
Frame:
https://www.youtube-nocookie.com/embed/Oh4WURZoR98?rel=0&showinfo=0&vq=hd720
Frame ID: 18705.2
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Varnish (Cache Tools) Expand
Detected patterns
- headers via /.*Varnish/i
YouTube (Video Players) Expand
Detected patterns
- html /<(?:param|embed|iframe)[^>]+youtube(?:-nocookie)?\.com\/(?:v|embed)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Google Analytics (Analytics) Expand
Detected patterns
- script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- script /modernizr(?:-([\d.]*[\d]))?.*\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
Page Statistics
44 Outgoing links
These are links going to different origins than the main page.
Title: Mathy Vanhoef
Search URL Search Domain Scan URL
Title: imec-DistriNet
Search URL Search Domain Scan URL
Title: database of CERT/CC
Search URL Search Domain Scan URL
Title: Computer and Communications Security (CCS)
Search URL Search Domain Scan URL
Title: Black Hat Europe
Search URL Search Domain Scan URL
Title: non-browser software
Search URL Search Domain Scan URL
Title: Apple's iOS and OS X
Search URL Search Domain Scan URL
Title: Android apps
Search URL Search Domain Scan URL
Title: Android apps again
Search URL Search Domain Scan URL
Title: banking apps
Search URL Search Domain Scan URL
Title: VPN apps
Search URL Search Domain Scan URL
Title: keystream
Search URL Search Domain Scan URL
Title: English text can still be decrypted
Search URL Search Domain Scan URL
Title: hijack TCP connections
Search URL Search Domain Scan URL
Title: adopted at a high rate
Search URL Search Domain Scan URL
Title: 50% of Android devices
Search URL Search Domain Scan URL
Title: CVE-2017-13077
Search URL Search Domain Scan URL
Title: CVE-2017-13078
Search URL Search Domain Scan URL
Title: CVE-2017-13079
Search URL Search Domain Scan URL
Title: CVE-2017-13080
Search URL Search Domain Scan URL
Title: CVE-2017-13081
Search URL Search Domain Scan URL
Title: CVE-2017-13082
Search URL Search Domain Scan URL
Title: CVE-2017-13084
Search URL Search Domain Scan URL
Title: CVE-2017-13086
Search URL Search Domain Scan URL
Title: CVE-2017-13087
Search URL Search Domain Scan URL
Title: CVE-2017-13088
Search URL Search Domain Scan URL
Title: vulnerability note VU#228519
Search URL Search Domain Scan URL
Title: Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Search URL Search Domain Scan URL
Title: Computer and Communications Security (CCS)
Search URL Search Domain Scan URL
Title: honorary authorship
Search URL Search Domain Scan URL
Title: author list
Search URL Search Domain Scan URL
Title: division of work
Search URL Search Domain Scan URL
Title: another paper
Search URL Search Domain Scan URL
Title: ic_set_key
Search URL Search Domain Scan URL
Title: channel-based MitM position
Search URL Search Domain Scan URL
Title: Wi-Fi Alliance
Search URL Search Domain Scan URL
Title: The Wi-Fi Alliance has a plan
Search URL Search Domain Scan URL
Title: all the information these dating websites may be collecting
Search URL Search Domain Scan URL
Title: pleonasm
Search URL Search Domain Scan URL
Title: Wi-Fi Protected Setup (WPS)
Search URL Search Domain Scan URL
Title: WPA-TKIP
Search URL Search Domain Scan URL
Title: CERT/CC
Search URL Search Domain Scan URL
Title: Creative Commons Attribution 4.0 International License
Search URL Search Domain Scan URL
Title: TEMPLATED
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.krackattacks.com/ |
37 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default.css
www.krackattacks.com/css/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
www.krackattacks.com/js/ |
94 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.min.js
www.krackattacks.com/js/ |
15 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js
www.googletagmanager.com/gtag/ |
51 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-small.png
www.krackattacks.com/images/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Oh4WURZoR98
www.youtube-nocookie.com/embed/ Frame 1870 |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg01.png
www.krackattacks.com/images/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
down.png
www.krackattacks.com/images/ |
272 B 290 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ |
34 KB 14 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/r/ |
35 B 53 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.youtube-nocookie.com
- URL
- https://www.youtube-nocookie.com/embed/Oh4WURZoR98?rel=0&showinfo=0&vq=hd720
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.krackattacks.com/ | Name: _gat_gtag_UA_35642360_3 Value: 1 |
|
.krackattacks.com/ | Name: _gid Value: GA1.2.1459028370.1508253761 |
|
.krackattacks.com/ | Name: _ga Value: GA1.2.155121009.1508253761 |
|
.krackattacks.com/ | Name: __cfduid Value: d0d65656663879d8e0ecf421209a65a5e1508253760 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.google-analytics.com
www.googletagmanager.com
www.krackattacks.com
www.youtube-nocookie.com
www.youtube-nocookie.com
2400:cb00:2048:1::681b:a590
2a00:1450:4001:825::2008
2a00:1450:4001:825::200e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