https://cyberplace.social/@GossiTheDog/113834848200229959

提交的 URL:
https://cyberplace.social/@GossiTheDog/113834848200229959
报告完成时间:
Copy link

从页面中识别出的传出链接

链接文本
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/BleepingComputer ·Sep 8, 2021Hackers leak passwords for 500,000 Fortinet VPN accounts
https://doublepulsar.com/2022-zero-day-was-used-to-raid-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7fhttps://doublepulsar.com/2022-zero-day-was-used-to-raid-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7f
https://doublepulsar.com/2022-zero-day-was-used-to-raid-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7fDoublePulsar ·Jan 162022 zero day was used to raid Fortigate firewall configs. Somebody just released them.ByKevin Beaumont
https://github.com/arsolutioner/fortigate-belsen-leak/blob/main/affected_ips.txthttps://github.com/arsolutioner/fortigate-belsen-leak/blob/main/affected_ips.txt
https://github.com/arsolutioner/fortigate-belsen-leak/blob/main/affected_ips.txtGitHubfortigate-belsen-leak/affected_ips.txt at main · arsolutioner/fortigate-belsen-leakResearch repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group - arsolutioner/fortigate-belsen-leak
https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-postinghttps://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-posting
https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-postingFortinet Blog ·Jan 16Analysis of Threat Actor Data Posting | Fortinet BlogThis blog analysis regarding a recent threat actor posting, which claims to offer compromised configuration and VPN credentials from FortiGate devices, provides factual information to help our cust…
https://raw.githubusercontent.com/GossiTheDog/Monitoring/refs/heads/main/Fortigate-Config-Dump-emails.txthttps://raw.githubusercontent.com/GossiTheDog/Monitoring/refs/heads/main/Fortigate-Config-Dump-emails.txt
https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/834/870/896/877/266/original/d2e4b7dcaec64569.png

JavaScript 变量 · 找到 10 个

Copy link

在页面窗口对象上加载的全局 JavaScript 变量是在函数外部声明的变量,可以从当前范围内的代码中的任何位置访问

名称类型
onbeforetoggleobject
documentPictureInPictureobject
onscrollendobject
webpackJsonpobject
setImmediatefunction
clearImmediatefunction
__REACT_INTL_CONTEXT__object
coreobject
_rails_loadedboolean
Mousetrapfunction

控制台日志消息 · 找到 0 条

Copy link

记录到 Web 控制台的消息

页面的原始 HTML 正文