High-Tech Bridge service and API for SSL/TLS server testing
Common Information
Type Value
UUID f61cd29d-368a-4904-86e8-bf6e584d65f9
Fingerprint 9d8abc1859232687
Analysis status DONE
Considered CTI value 2
Text language
Published April 24, 2016, 1:05 p.m.
Added to db Jan. 18, 2023, 8:07 p.m.
Last updated Nov. 17, 2024, 12:58 p.m.
Headline Alexander V. Leonov
Title High-Tech Bridge service and API for SSL/TLS server testing
Detected Hints/Tags/Attributes 62/2/57
Attributes
Details Type #Events CTI Value
Details CVE 22
cve-2014-0224
Details CVE 2
cve-2011-1473
Details CVE 2
cve-2009-3555
Details CVE 90
cve-2014-0160
Details Domain 6
www.htbridge.com
Details Domain 25
vulners.com
Details Domain 3
crt.comodoca.com
Details Domain 6
ocsp.comodoca.com
Details Domain 2
secure.comodo.com
Details Domain 4
crl.comodoca.com
Details Domain 1
static.17.75.46.78.clients.your-server.de
Details File 5
d.html
Details File 9
comodorsadomainvalidationsecureserverca.crt
Details File 35
style.css
Details File 1
genericons.css
Details File 2
dark.css
Details File 2
responsive.css
Details File 40
jquery.js
Details File 218
min.js
Details File 7
loader.php
Details File 4
3.js
Details File 1
cve.png
Details File 1
back-e1457556882458.png
Details File 1
cropped-logo_small-e1457554507539-1.png
Details File 1
zdt.png
Details File 1
zdt_full_script.png
Details File 1
zdt_private.png
Details File 1
stat.png
Details File 1
sles_bulletin.png
Details File 1
badlock.png
Details File 1
screenshot-from-2016-04-04-140454.png
Details File 1
screenshot-from-2016-04-04-140704.png
Details File 1
screenshot-from-2016-04-04-135029.png
Details File 1
mitre.png
Details File 1
nvd.png
Details File 1
screenshot-from-2016-03-21-124046.png
Details File 1
dark-search.png
Details File 1
watch.js
Details File 18
analytics.js
Details File 1
advert.gif
Details File 1
file3a2f2f2ftmp2fe7a1dba6c96391f51a82f8c4b541844f64cfce8e777192fc669261f432b47a44.html
Details sha256 1
8ccbf84ddd1a720e1473b77011a56c651de9dfd77259578b173779f44de51154
Details sha256 1
bd9ed1c8b6f20d7b7a782e0cb0e8020bfd9bd208486440b14b52868f996cc485
Details IPv4 1
78.46.75.17
Details IPv4 56
1.3.6.1
Details IPv4 3
49.1.2.2
Details IPv4 4
2.23.140.1
Details IPv4 1
17.75.46.78
Details Url 1
https://www.htbridge.com/ssl/chssl/$d.html
Details Url 1
https://www.htbridge.com/ssl/chssl/[ustamp].html
Details Url 1
https://www.htbridge.com/ssl/#api
Details Url 2
http://crt.comodoca.com/comodorsadomainvalidationsecureserverca.crt
Details Url 4
http://ocsp.comodoca.com
Details Url 2
https://secure.comodo.com/cps
Details Url 2
http://crl.comodoca.com/comodorsadomainvalidationsecureserverca.crl
Details Url 1
https://blog.vulners.com/wp-content/themes/catch-kathmandu/style.cssver=4.4.2|https://blog.vulners.com/wp-content/themes/catch-kathmandu/css/genericons/genericons.cssver=3.4.1|https://blog.vulners.com/wp-content/themes/catch-kathmandu/css/dark.css|https://blog.vulners.com/wp-content/themes/catch-kathmandu/css/responsive.cssver=4.4.2|https://blog.vulners.com/wp-includes/js/jquery/jquery.jsver=1.11.3|https://blog.vulners.com/wp-includes/js/jquery/jquery-migrate.min.jsver=1.2.1|https://blog.vulners.com/wp-content/plugins/better-analytics/js/loader.phpver=1.1.3.js|https://blog.vulners.com/wp-content/themes/catch-kathmandu/js/catchkathmandu-allmenu.min.jsver=20140317|https://blog.vulners.com/wp-content/themes/catch-kathmandu/js/catchkathmandu.fitvids.min.jsver=20140317|https://blog.vulners.com/wp-content/themes/catch-kathmandu/js/catchkathmandu-scrollup.min.jsver=20072014|https://blog.vulners.com/wp-includes/js/wp-embed.min.jsver=4.4.2|https://avleonov.com/wp-content/uploads/2016/03/cve.png|https://blog.vulners.com/wp-content/uploads/2016/03/back-e1457556882458.png|https://blog.vulners.com/wp-content/uploads/2016/03/cropped-logo_small-e1457554507539-1.png|https://blog.vulners.com/wp-content/uploads/2016/04/zdt.png|https://blog.vulners.com/wp-content/uploads/2016/04/zdt_full_script.png|https://blog.vulners.com/wp-content/uploads/2016/04/zdt_private.png|https://blog.vulners.com/wp-content/uploads/2016/04/stat.png|https://blog.vulners.com/wp-content/uploads/2016/04/sles_bulletin.png|https://blog.vulners.com/wp-content/uploads/2016/04/badlock.png|https://blog.vulners.com/wp-content/uploads/2016/04/screenshot-from-2016-04-04-140454.png|https://blog.vulners.com/wp-content/uploads/2016/04/screenshot-from-2016-04-04-140704.png|https://blog.vulners.com/wp-content/uploads/2016/04/screenshot-from-2016-04-04-135029.png|https://blog.vulners.com/wp-content/uploads/2016/03/mitre.png|https://blog.vulners.com/wp-content/uploads/2016/03/nvd.png|https://blog.vulners.com/wp-content/uploads/2016/03/screenshot-from-2016-03-21-124046.png|https://blog.vulners.com/wp-content/themes/catch-kathmandu/images/dark-search.png|https://mc.yandex.ru/metrika/watch.js|https://www.google-analytics.com/analytics.js|https://mc.yandex.ru/metrika/advert.gif|https://mc.yandex.ru/watch/34503445wmode=5callback=_ymjsp956111828page-url=file3a2f2f2ftmp2fe7a1dba6c96391f51a82f8c4b541844f64cfce8e777192fc669261f432b47a44.htmlbrowser-info=s3a1024x768x323ask3a13afpr3a2166136261013acn3a13aw3a1920x12003az3a1203ai3a201604211717223aet3a14612518423aen3autf-83av3a6853ac3a13ala3ac3awh3a13apv3a13als3a9818222434313arqn3a13arn3a4149496303ahid3a8683717913awn3a216393ahl3a13arqnl3a13ast3a14612518423au3a1461251842781830643at3avulners20blog20e2809320information20security20news2c20research2c20malware20analysis|https://mc.yandex.ru/watch/34503445/1wmode=5callback=_ymjsp956111828page-url=file3a2f2f2ftmp2fe7a1dba6c96391f51a82f8c4b541844f64cfce8e777192fc669261f432b47a44.htmlbrowser
Details Url 1
https://78.46.75.17