How to use URLSCAN part3
This is the part 3 of (How to use URLSCAN part2 – osintafrica)
Now, lets go to the “HTTP” menu
- HTTP
In this menu, we can see all the HTTP transactions after the URL has been submitted.
The HTTP transactions consist of all the resources (HTLM, Script, AJAX, Images …) used by the website.
This section is very useful for the analyst.
Click on one of the options available
- In our case, we click on the button “Image” to find the image described in the section Image and all the files used by the image.
Click on the “expand” sign to see more details about each file.
We can observe the following details:
Full URL shows the requested image from Host: www.reddit.com.
We can find others information such as the server’s name used, TLS protocol version used, the Hash of the image used, the software used and others …
Click on the Show headers to find the details about the request headers and the response headers from the server side.
Click on Check archive.org that will lead you the website https://web.archive.org (You can Google search to find more information about it)
Click on each option (HTLM, Script, AJAX, Images) available to learn more about.
2. Redirect
Here, you will find all the redirect links on the website.
3. Links
The page contains all the links available on the website.
You can click on each of them or scan each of them to more details about.
4. Behaviour
The menu contains the information about the Security Headers, the Cookies, the JavaScript global variables used
5. Indicators
This menu contains all the domains, IP addresses, hashes used by the websites.
6. Similar
You will find some information about the URLS, ASN numbers, IP address, domains scanned on the website.
7. DOM
This menu is very useful as it has the whole map of the website such as the scripts used by the website, the HTML code used by the website and others …
8. Content
the Form (Google search for Form object DOM) used in DOM is available.
9. API
The API used by URLSCAN to get the information from the servers
Part4 (How to use URLSCAN part4 – osintafrica)
Bangaly Koita is a Cyber Security Analyst and researcher working for Radarcs Cyber Security in Vienna-Austria. As a passionate in cyber security, he writes articles to share his knowledge and experience to the vast community of IT but in general Cyber Security.