Help
RSS
API
Feed
Maltego
Contact
Domain > 0xsobky.github.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2016-04-20
199.27.76.133
(
ClassC
)
2017-01-04
151.101.192.133
(
ClassC
)
2017-11-04
151.101.1.147
(
ClassC
)
2019-09-12
185.199.110.153
(
ClassC
)
2024-06-17
185.199.111.153
(
ClassC
)
2024-07-12
185.199.108.153
(
ClassC
)
Port 80
HTTP/1.1 200 OKServer: GitHub.comContent-Type: text/html; charsetutf-8Last-Modified: Thu, 27 Sep 2018 22:14:34 GMTETag: 5bad564a-1a74Access-Control-Allow-Origin: *Expires: Thu, 12 Sep 2019 08:18:30 GM !DOCTYPE html>html> head> title>Hacklog – by Ahmed Elsobky | Web Security Researcher/title> meta charsetutf-8 /> meta contenttext/html; charsetutf-8 http-equivContent-Type> meta http-equivX-UA-Compatible contentIEedge> meta nameviewport contentwidthdevice-width, initial-scale1.0, maximum-scale1.0> meta namedescription contentby Ahmed Elsobky | Web Security Researcher> meta propertyog:description contentby Ahmed Elsobky | Web Security Researcher /> meta nameauthor contentHacklog /> !--if lt IE 9> script srchttp://html5shiv.googlecode.com/svn/trunk/html5.js>/script> !endif--> link relstylesheet typetext/css href/style.css /> link relalternate typeapplication/rss+xml titleHacklog - by Ahmed Elsobky | Web Security Researcher href/feed.xml /> !-- Created with Jekyll Now - http://github.com/barryclark/jekyll-now --> /head> body> div classwrapper-masthead> div classcontainer> header classmasthead clearfix> a href/ classsite-avatar>img srchttps://raw.githubusercontent.com/0xsobky/0xsobky.github.io/master/images/avatar.jpg />/a> div classsite-info> h1 classsite-name>a href/>Hacklog/a>/h1> p classsite-description>by Ahmed Elsobky | Web Security Researcher/p> /div> nav> a href/>Main()/a> a href/projects>{Projects}/a> a href/whoami>~# Whoami/a> /nav> /header> /div> /div> div idmain rolemain classcontainer> div classposts> article classpost> h1>a href/novel-deanonymization-techniques/>Novel Techniques for User Deanonymization Attacks/a>/h1> div classentry> p>em>strong>TL;DR/strong>: By abusing auth-based redirections and user-specific URIs on modern web applications, an attacker can easily identify and deanonymize any given predefined group of users across the web./em>/p> /div> a href/novel-deanonymization-techniques/ classread-more>Read More/a> /article> article classpost> h1>a hre
Port 443
HTTP/1.1 200 OKServer: GitHub.comContent-Type: text/html; charsetutf-8Last-Modified: Thu, 27 Sep 2018 22:14:34 GMTETag: 5bad564a-1a74Access-Control-Allow-Origin: *Expires: Thu, 12 Sep 2019 08:18:30 GM !DOCTYPE html>html> head> title>Hacklog – by Ahmed Elsobky | Web Security Researcher/title> meta charsetutf-8 /> meta contenttext/html; charsetutf-8 http-equivContent-Type> meta http-equivX-UA-Compatible contentIEedge> meta nameviewport contentwidthdevice-width, initial-scale1.0, maximum-scale1.0> meta namedescription contentby Ahmed Elsobky | Web Security Researcher> meta propertyog:description contentby Ahmed Elsobky | Web Security Researcher /> meta nameauthor contentHacklog /> !--if lt IE 9> script srchttp://html5shiv.googlecode.com/svn/trunk/html5.js>/script> !endif--> link relstylesheet typetext/css href/style.css /> link relalternate typeapplication/rss+xml titleHacklog - by Ahmed Elsobky | Web Security Researcher href/feed.xml /> !-- Created with Jekyll Now - http://github.com/barryclark/jekyll-now --> /head> body> div classwrapper-masthead> div classcontainer> header classmasthead clearfix> a href/ classsite-avatar>img srchttps://raw.githubusercontent.com/0xsobky/0xsobky.github.io/master/images/avatar.jpg />/a> div classsite-info> h1 classsite-name>a href/>Hacklog/a>/h1> p classsite-description>by Ahmed Elsobky | Web Security Researcher/p> /div> nav> a href/>Main()/a> a href/projects>{Projects}/a> a href/whoami>~# Whoami/a> /nav> /header> /div> /div> div idmain rolemain classcontainer> div classposts> article classpost> h1>a href/novel-deanonymization-techniques/>Novel Techniques for User Deanonymization Attacks/a>/h1> div classentry> p>em>strong>TL;DR/strong>: By abusing auth-based redirections and user-specific URIs on modern web applications, an attacker can easily identify and deanonymize any given predefined group of users across the web./em>/p> /div> a href/novel-deanonymization-techniques/ classread-more>Read More/a> /article> article classpost> h1>a hre
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]