Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-10-01 18:09:07

expired found date

-

created at

2024-06-09 12:54:25

updated at

2026-01-02 14:55:21

Domain name statistics

length

17

crc

25164

tld

2688

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

67884257

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

39797

mp size raw text

12616

mp inner links count

32

mp inner links status

20 (imported)

Open Graph

title

SkullSecurity

description

Adventures In Security

site name

SkullSecurity Blog

author

admin

updated

2025-12-21 15:37:52

raw text

SkullSecurity | SkullSecurity Blog SkullSecurity Adventures In Security Blog About Ron's CV Mastodon How-to: Reversing and debugging ISAPI modules Recently, I had the privilege to write a detailed analysis of CVE-2023-34362 , which is series of several vulnerabilities in the MOVEit file transfer application that lead to remote code execution. One of the several vulnerabilities involved an ISAPI module - specifically, the MoveITISAPI.dll ISAPI extension. One of the many vulnerabilities that comprised the MOVEit RCE was a header-injection issue, where the ISAPI application parsed headers differently than the .net application. This point is going to dig into how to analyze and reverse engineer an ISAPI-based service! This wasn’t the first time in the recent past I’d had to work on something written as an ISAPI module, and each time I feel like I have to start over and remember how it’s supposed to work. This time, I thou...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

Gry (27)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

9685

text words

1980

text unique words

649

text lines

299

text sentences

88

text paragraphs

29

text words per sentence

22

text matched phrases

19

text matched dictionaries

5

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

30 (processing completed, results pushed to table crawler_sitemaps.ext_domain_sitemap_lists)

sitemap review version

2

sitemap urls count

342

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2023-12-24 00:55:38

sitemap process date

2025-08-06 21:23:21

sitemap first import date

-

sitemap last import date

-