High-Tech Bridge service and API for SSL/TLS server testing
Tags
Common Information
Type | Value |
---|---|
UUID | f61cd29d-368a-4904-86e8-bf6e584d65f9 |
Fingerprint | 9d8abc1859232687 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | April 24, 2016, 1:05 p.m. |
Added to db | Jan. 18, 2023, 8:07 p.m. |
Last updated | Nov. 17, 2024, 12:58 p.m. |
Headline | Alexander V. Leonov |
Title | High-Tech Bridge service and API for SSL/TLS server testing |
Detected Hints/Tags/Attributes | 62/2/57 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 22 | cve-2014-0224 |
|
Details | CVE | 2 | cve-2011-1473 |
|
Details | CVE | 2 | cve-2009-3555 |
|
Details | CVE | 90 | cve-2014-0160 |
|
Details | Domain | 6 | www.htbridge.com |
|
Details | Domain | 25 | vulners.com |
|
Details | Domain | 3 | crt.comodoca.com |
|
Details | Domain | 6 | ocsp.comodoca.com |
|
Details | Domain | 2 | secure.comodo.com |
|
Details | Domain | 4 | crl.comodoca.com |
|
Details | Domain | 1 | static.17.75.46.78.clients.your-server.de |
|
Details | File | 5 | d.html |
|
Details | File | 9 | comodorsadomainvalidationsecureserverca.crt |
|
Details | File | 35 | style.css |
|
Details | File | 1 | genericons.css |
|
Details | File | 2 | dark.css |
|
Details | File | 2 | responsive.css |
|
Details | File | 40 | jquery.js |
|
Details | File | 218 | min.js |
|
Details | File | 7 | loader.php |
|
Details | File | 4 | 3.js |
|
Details | File | 1 | cve.png |
|
Details | File | 1 | back-e1457556882458.png |
|
Details | File | 1 | cropped-logo_small-e1457554507539-1.png |
|
Details | File | 1 | zdt.png |
|
Details | File | 1 | zdt_full_script.png |
|
Details | File | 1 | zdt_private.png |
|
Details | File | 1 | stat.png |
|
Details | File | 1 | sles_bulletin.png |
|
Details | File | 1 | badlock.png |
|
Details | File | 1 | screenshot-from-2016-04-04-140454.png |
|
Details | File | 1 | screenshot-from-2016-04-04-140704.png |
|
Details | File | 1 | screenshot-from-2016-04-04-135029.png |
|
Details | File | 1 | mitre.png |
|
Details | File | 1 | nvd.png |
|
Details | File | 1 | screenshot-from-2016-03-21-124046.png |
|
Details | File | 1 | dark-search.png |
|
Details | File | 1 | watch.js |
|
Details | File | 18 | analytics.js |
|
Details | File | 1 | advert.gif |
|
Details | File | 1 | file3a2f2f2ftmp2fe7a1dba6c96391f51a82f8c4b541844f64cfce8e777192fc669261f432b47a44.html |
|
Details | sha256 | 1 | 8ccbf84ddd1a720e1473b77011a56c651de9dfd77259578b173779f44de51154 |
|
Details | sha256 | 1 | bd9ed1c8b6f20d7b7a782e0cb0e8020bfd9bd208486440b14b52868f996cc485 |
|
Details | IPv4 | 1 | 78.46.75.17 |
|
Details | IPv4 | 56 | 1.3.6.1 |
|
Details | IPv4 | 3 | 49.1.2.2 |
|
Details | IPv4 | 4 | 2.23.140.1 |
|
Details | IPv4 | 1 | 17.75.46.78 |
|
Details | Url | 1 | https://www.htbridge.com/ssl/chssl/$d.html |
|
Details | Url | 1 | https://www.htbridge.com/ssl/chssl/[ustamp].html |
|
Details | Url | 1 | https://www.htbridge.com/ssl/#api |
|
Details | Url | 2 | http://crt.comodoca.com/comodorsadomainvalidationsecureserverca.crt |
|
Details | Url | 4 | http://ocsp.comodoca.com |
|
Details | Url | 2 | https://secure.comodo.com/cps |
|
Details | Url | 2 | http://crl.comodoca.com/comodorsadomainvalidationsecureserverca.crl |
|
Details | Url | 1 | https://blog.vulners.com/wp-content/themes/catch-kathmandu/style.cssver=4.4.2|https://blog.vulners.com/wp-content/themes/catch-kathmandu/css/genericons/genericons.cssver=3.4.1|https://blog.vulners.com/wp-content/themes/catch-kathmandu/css/dark.css|https://blog.vulners.com/wp-content/themes/catch-kathmandu/css/responsive.cssver=4.4.2|https://blog.vulners.com/wp-includes/js/jquery/jquery.jsver=1.11.3|https://blog.vulners.com/wp-includes/js/jquery/jquery-migrate.min.jsver=1.2.1|https://blog.vulners.com/wp-content/plugins/better-analytics/js/loader.phpver=1.1.3.js|https://blog.vulners.com/wp-content/themes/catch-kathmandu/js/catchkathmandu-allmenu.min.jsver=20140317|https://blog.vulners.com/wp-content/themes/catch-kathmandu/js/catchkathmandu.fitvids.min.jsver=20140317|https://blog.vulners.com/wp-content/themes/catch-kathmandu/js/catchkathmandu-scrollup.min.jsver=20072014|https://blog.vulners.com/wp-includes/js/wp-embed.min.jsver=4.4.2|https://avleonov.com/wp-content/uploads/2016/03/cve.png|https://blog.vulners.com/wp-content/uploads/2016/03/back-e1457556882458.png|https://blog.vulners.com/wp-content/uploads/2016/03/cropped-logo_small-e1457554507539-1.png|https://blog.vulners.com/wp-content/uploads/2016/04/zdt.png|https://blog.vulners.com/wp-content/uploads/2016/04/zdt_full_script.png|https://blog.vulners.com/wp-content/uploads/2016/04/zdt_private.png|https://blog.vulners.com/wp-content/uploads/2016/04/stat.png|https://blog.vulners.com/wp-content/uploads/2016/04/sles_bulletin.png|https://blog.vulners.com/wp-content/uploads/2016/04/badlock.png|https://blog.vulners.com/wp-content/uploads/2016/04/screenshot-from-2016-04-04-140454.png|https://blog.vulners.com/wp-content/uploads/2016/04/screenshot-from-2016-04-04-140704.png|https://blog.vulners.com/wp-content/uploads/2016/04/screenshot-from-2016-04-04-135029.png|https://blog.vulners.com/wp-content/uploads/2016/03/mitre.png|https://blog.vulners.com/wp-content/uploads/2016/03/nvd.png|https://blog.vulners.com/wp-content/uploads/2016/03/screenshot-from-2016-03-21-124046.png|https://blog.vulners.com/wp-content/themes/catch-kathmandu/images/dark-search.png|https://mc.yandex.ru/metrika/watch.js|https://www.google-analytics.com/analytics.js|https://mc.yandex.ru/metrika/advert.gif|https://mc.yandex.ru/watch/34503445wmode=5callback=_ymjsp956111828page-url=file3a2f2f2ftmp2fe7a1dba6c96391f51a82f8c4b541844f64cfce8e777192fc669261f432b47a44.htmlbrowser-info=s3a1024x768x323ask3a13afpr3a2166136261013acn3a13aw3a1920x12003az3a1203ai3a201604211717223aet3a14612518423aen3autf-83av3a6853ac3a13ala3ac3awh3a13apv3a13als3a9818222434313arqn3a13arn3a4149496303ahid3a8683717913awn3a216393ahl3a13arqnl3a13ast3a14612518423au3a1461251842781830643at3avulners20blog20e2809320information20security20news2c20research2c20malware20analysis|https://mc.yandex.ru/watch/34503445/1wmode=5callback=_ymjsp956111828page-url=file3a2f2f2ftmp2fe7a1dba6c96391f51a82f8c4b541844f64cfce8e777192fc669261f432b47a44.htmlbrowser |
|
Details | Url | 1 | https://78.46.75.17 |