Help
RSS
API
Feed
Maltego
Contact
Domain > www.tssci-security.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
Email
NOREPLY@TSSCI-SECURITY.COM
NameServer
NS-2026.AWSDNS-61.CO.UK
Created
2007-01-15 00:00:00
Changed
2015-12-18 00:00:00
Expires
2020-01-15 00:00:00
Registrar
ENOM, INC.
DNS Resolutions
Date
IP Address
2013-06-02
207.171.163.203
(
ClassC
)
2013-06-02
176.32.98.229
(
ClassC
)
2014-07-19
205.251.243.180
(
ClassC
)
2014-07-21
54.231.16.156
(
ClassC
)
2014-07-31
54.231.11.12
(
ClassC
)
2014-08-02
176.32.99.212
(
ClassC
)
2014-08-07
176.32.100.202
(
ClassC
)
2014-08-09
54.231.18.100
(
ClassC
)
2014-08-11
205.251.243.108
(
ClassC
)
2014-11-05
54.231.32.228
(
ClassC
)
2014-11-07
54.231.10.100
(
ClassC
)
2014-11-12
54.231.10.196
(
ClassC
)
2014-11-17
54.231.8.44
(
ClassC
)
2014-12-24
54.231.64.44
(
ClassC
)
2014-12-27
54.231.12.196
(
ClassC
)
2014-12-31
54.231.65.20
(
ClassC
)
2015-01-09
54.231.0.172
(
ClassC
)
2015-01-13
54.231.2.132
(
ClassC
)
2015-02-27
54.231.17.84
(
ClassC
)
2015-03-06
54.231.1.28
(
ClassC
)
2015-03-12
54.231.2.244
(
ClassC
)
2015-03-15
54.231.10.44
(
ClassC
)
2015-03-24
54.231.18.236
(
ClassC
)
2015-06-12
54.231.65.44
(
ClassC
)
2015-08-18
54.231.14.220
(
ClassC
)
2015-09-23
54.231.12.132
(
ClassC
)
2016-01-06
54.231.112.130
(
ClassC
)
2016-03-17
54.231.8.132
(
ClassC
)
2023-07-20
52.216.59.229
(
ClassC
)
2024-02-16
52.217.116.101
(
ClassC
)
2024-03-21
52.216.138.202
(
ClassC
)
2024-04-15
16.182.65.213
(
ClassC
)
2024-05-13
54.231.199.69
(
ClassC
)
2024-06-14
52.217.94.99
(
ClassC
)
2024-07-01
16.182.68.13
(
ClassC
)
2024-07-21
16.182.32.117
(
ClassC
)
2024-08-10
52.217.201.37
(
ClassC
)
2024-08-23
52.216.222.165
(
ClassC
)
2024-09-01
16.182.32.141
(
ClassC
)
2024-09-13
52.216.25.195
(
ClassC
)
2024-11-29
52.217.73.211
(
ClassC
)
2024-12-29
52.216.62.221
(
ClassC
)
2025-02-22
16.15.184.136
(
ClassC
)
2025-03-11
52.216.41.93
(
ClassC
)
2025-04-19
3.5.31.15
(
ClassC
)
2025-05-22
52.217.142.133
(
ClassC
)
2025-06-18
16.15.185.251
(
ClassC
)
2025-06-27
52.217.124.245
(
ClassC
)
2025-07-18
16.182.68.77
(
ClassC
)
2025-08-03
52.217.226.77
(
ClassC
)
Port 80
HTTP/1.1 200 OKx-amz-id-2: nwgww+7UvmKWQ19zkecn7jgVTZnQQ3yxMNH+biASwushW6LWlV3tTajWLf++QXsEYYc8A/5l9hcx-amz-request-id: DA5F4D73QZP3CS9CDate: Thu, 20 Jul 2023 08:32:16 GMTLast-Modified: Wed, 24 Jun 20 !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Strict//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd>html xmlnshttp://www.w3.org/1999/xhtml xml:langen langen> head profilehttp://gmpg.org/xfn/11> meta http-equivContent-Type contenttext/html; charsetUTF-8/> meta namedescription contenttssci-security - top secret/secure computing information/> title>tssci security/title> link relstylesheet typetext/css mediascreen href/static/css/style-min.css/> link relstylesheet typetext/css mediascreen href/static/_pygments-min.css/> link relalternate typeapplication/rss+xml titletssci security href/feed.atom/> script typetext/javascript>if (top!self){top.location.hrefself.location.href;}/script> /head> body> header> a href/ titletssci security>img src/static/img/front.png width760 height175 alttssci security />/a> /header> nav> ul> li>a href/ titleHome>Home/a>/li> li>a href/about/ titleAbout>About/a>/li> li>a href/projects/ titleProjects>Projects/a>/li> li>a href/research/ titleResearch>Research/a>/li> /ul> /nav> article> section idpost-475 classpost> h1>a href/archives/2013/05/30/decoding-and-tampering-protobuf-serialized-messages-in-burp/>Decoding and Tampering Protobuf Serialized Messages in Burp/a>/h1> p>If youve ever assessed or poked at an application that uses a classreference external hrefhttps://code.google.com/p/protobuf/>GoogleProtocol Buffers/a>, you know how painstaking the whole process can be. Whenyoure lucky enough to have a corresponding .proto, crafting messagesvia a classreference external hrefhttps://developers.google.com/protocol-buffers/docs/reference/overview>generated APIs/a> is tedious. When you dont, you have to resort toa classreference external hrefhttp://www.segmentationfault.fr/publications/reversing-google-play-and-micro-protobuf-applications/>reversing the protocol format/a> by hand and/or a classreference external hrefhttp://www.sysdream.com/reverse-engineering-protobuf-apps>extracting the
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]