https://cyberplace.social/@GossiTheDog/113834848200229959

Copy link

從頁面中識別的傳出連結

連結Text
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/BleepingComputer ·Sep 8, 2021Hackers leak passwords for 500,000 Fortinet VPN accounts
https://doublepulsar.com/2022-zero-day-was-used-to-raid-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7fhttps://doublepulsar.com/2022-zero-day-was-used-to-raid-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7f
https://doublepulsar.com/2022-zero-day-was-used-to-raid-fortigate-firewall-configs-somebody-just-released-them-a7a74e0b0c7fDoublePulsar ·Jan 162022 zero day was used to raid Fortigate firewall configs. Somebody just released them.ByKevin Beaumont
https://github.com/arsolutioner/fortigate-belsen-leak/blob/main/affected_ips.txthttps://github.com/arsolutioner/fortigate-belsen-leak/blob/main/affected_ips.txt
https://github.com/arsolutioner/fortigate-belsen-leak/blob/main/affected_ips.txtGitHubfortigate-belsen-leak/affected_ips.txt at main · arsolutioner/fortigate-belsen-leakResearch repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group - arsolutioner/fortigate-belsen-leak
https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-postinghttps://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-posting
https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-postingFortinet Blog ·Jan 16Analysis of Threat Actor Data Posting | Fortinet BlogThis blog analysis regarding a recent threat actor posting, which claims to offer compromised configuration and VPN credentials from FortiGate devices, provides factual information to help our cust…
https://raw.githubusercontent.com/GossiTheDog/Monitoring/refs/heads/main/Fortigate-Config-Dump-emails.txthttps://raw.githubusercontent.com/GossiTheDog/Monitoring/refs/heads/main/Fortigate-Config-Dump-emails.txt
https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/834/870/896/877/266/original/d2e4b7dcaec64569.png

JavaScript 變數 · 找到 10 個

Copy link

在頁面的視窗物件上載入的全域 JavaScript 變數是在函數外部宣告的變數,可從目前範圍內程式碼中的任何位置存取

名稱類型
onbeforetoggleobject
documentPictureInPictureobject
onscrollendobject
webpackJsonpobject
setImmediatefunction
clearImmediatefunction
__REACT_INTL_CONTEXT__object
coreobject
_rails_loadedboolean
Mousetrapfunction

主控台記錄訊息 · 找到 0 條

Copy link

記錄到 Web 主控台的訊息

頁面的原始 HTML 主體