Help
RSS
API
Feed
Maltego
Contact
Domain > beta.tests.shield.raise.security.amazon.dev
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-08-27
52.85.132.15
(
ClassC
)
2025-11-12
3.175.34.99
(
ClassC
)
2025-11-16
3.175.34.43
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Wed, 12 Nov 2025 05:53:21 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://beta.tests.shield.raise.security.am html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 403 ForbiddenContent-Type: text/htmlContent-Length: 10601Connection: keep-aliveLast-Modified: Fri, 03 Oct 2025 13:31:03 GMTx-amz-server-side-encryption: AES256x-amz-version-id: U5vRxg6uPUAnmD !DOCTYPE html>html>head> script typetext/javascript> function getParameterInHashByName(parameterName, url) { if (!url) { url window.location.href; } try { const urlFull new URL(url); const urlParameters new URLSearchParams(urlFull.hash.substring(1)); const parameterValue urlParameters.get(parameterName); if (parameterValue null) { return null; } return decodeURIComponent(parameterValue) } catch (e) { return null; } } function getValidURL(url) { try { return new URL(url); } catch (e) { return null; } } function generateRandomBytes() { const array new Uint8Array(8); crypto.getRandomValues(array); return Array.from(array) .map(b > b.toString(16).padStart(2, 0)) .join(); } async function generateSha384(val) { const encoder new TextEncoder(); const msgBuffer encoder.encode(val); const hashBuffer await crypto.subtle.digest(SHA-384, msgBuffer); // Convert hash to hex string const hashArray Array.from(new Uint8Array(hashBuffer)); return hashArray .map(b > b.toString(16).padStart(2, 0)) .join(); } /** * Function that compares hash values using a constant-time comparison approach. * * We use a constant time comparison function, as opposed to the equality operator, to protect * against timing attacks. The equality operator returns the moment it detects any mismatched * character. Attackers use this vulnerability to discover hints about the strings being compared. * For example, if I am comparing two passwords and not using a constant time comparison function, * I can identify matching characters since execution times vary respectively to where the first * difference occurs. * * We use the XOR (^) and OR (|) operations, since they are CPU-level instructions that execute in * constant time and do not involve conditional branching. The XOR operation returns zero when both * inputs are identical, otherwise it returns a non-zero value. The OR operation accumulates the * XOR operations results, totaling to zero when every comparison is identical. Using b
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]