Help
RSS
API
Feed
Maltego
Contact
Domain > afbnjnxsit-1926820868-dgkgckakjn-t.codehs.me
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-04-16
18.160.249.75
(
ClassC
)
2025-12-04
3.175.34.38
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Thu, 04 Dec 2025 06:28:39 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://afbnjnxsit-1926820868-dgkgckakjn-t.codehs.me/X-Cache: Redirect from cloudfrontVia: 1.1 807ba99de77a37a6a53c93279fb231fe.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: KWT2AFJJ14hHAnEuHCcTwVm4Xsg1xkVK-bjbjvWXUuNszbXZE3DhJA html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Thu, 04 Dec 2025 06:28:39 GMTX-Frame-Options: SAMEORIGINSet-Cookie: _ga_3RCOCIVRH91; Domaincodehs.com; Path/Set-Cookie: intercom-cors-x13jbr4h1; Domaincodehs.com; HttpOnly; Path/; SameSiteNone; SecureServer: ApacheVary: Host,Accept-EncodingContent-Security-Policy: frame-ancestors self https://codehs.com https://*.codehs.comX-Robots-Tag: noindexX-Cache: Miss from cloudfrontVia: 1.1 7a41090c7fbdcc9568968409dbc13c78.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: WvmhchPpVyMHSOCYacdXgh62UsRVgJY_ajyUe-wULHkjARmi0dUSAg !---- Try an exploitation method by typing one of the attacks listed below - into the prompt. Make sure to try every method and keep track of the- results on your handout to provide CodeHS with a detailed report of their - security strengths and weaknesses.* brute force password attack* zero-day attack on OS* spear phishing email* SQL injection* buffer overflow* cross site scripting* DNS spoof* social engineering IT call--->!DOCTYPE html>html> head> title>Pen Test Simulation/title> /head> body> h3>Pen Test: Exploit Vulnerabilities/h3> p idmethod>/p> p idresult>/p> script> var input prompt(Exploitation method: ); if(input brute force password attack){ var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Fail; } else if (input zero-day attack on OS) { var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Youre in! You found a known vulnerability and now have access to a low level employees device.; } else if (input spear phishing email){ var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Fail; } else if (input SQL injection){ var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Youre in! You now have access to important database information.; } else if (input buffer overflow){ var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Fail; } else if (input cross site scripting){ var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Fail; } else if (input DNS spoof){ var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Fail; } else if (input social engineering IT call){ var method document.getElementById(method); method.innerHTML Exploitation method: + input; var result document.getElementById(result); result.innerHTML Result: Youre in! A low-level employee answered the phone, and thinking that you were legitimate, she gave you her username and password for the company intranet.; } else { var method document.getElementById(method); method.innerHTML Exploitation method: invalid method; var result document.getElementById(result); result.innerHTML Please enter a valid exploitation method.; } /script> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]