A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/barubary/statuses/109315811977585662",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-09T20:48:36Z",
"url": "https://infosec.exchange/@barubary/109315811977585662",
"attributedTo": "https://infosec.exchange/users/barubary",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/barubary/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/barubary/statuses/109315811977585662",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2022-11-09:objectId=20630015:objectType=Conversation",
"content": "<p>In order to test <a href=\"https://infosec.exchange/tags/antivirus\" class=\"mention hashtag\" rel=\"tag\">#<span>antivirus</span></a> software, the <a href=\"https://en.wikipedia.org/wiki/EICAR_test_file\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EICAR test virus</a> was created:</p><pre><code>X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*<br></code></pre><p>It is 68 bytes of plain ASCII text that also happen to be valid x86 machine code (all it does is output <code>EICAR-STANDARD-ANTIVIRUS-TEST-FILE!</code> and stop). The idea is that AV will treat this harmless file like malware, so you can test whether detection works properly without having to download an actual virus.</p><p>The original <a href=\"https://infosec.exchange/tags/eicar\" class=\"mention hashtag\" rel=\"tag\">#<span>eicar</span></a> spec called for AV to detect any file that starts with this string of 68 bytes. However, in 2002 a Windows batch worm was created that disguised itself as a harmless test file by starting its list of commands with the EICAR string (which causes a \"command not found\" error, but does not prevent the rest of the .bat file from running). If the user had AV installed, it would detect the worm only as a harmless test file.</p><p>To fix this, the <a href=\"https://www.eicar.org/download-anti-malware-testfile/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EICAR spec</a> was updated in 2003. It places the following constraints on the test file:</p><ul><li>It must be 128 bytes long or less.</li><li>The first 68 bytes must be identical to the test string shown above.</li><li>All following bytes (if any) must be from the following set of ASCII characters: space (32), tab (9), carriage return (13), line feed (10), Ctrl-Z (26).</li></ul><p>Anything else will not be detected as the EICAR test virus. This prevents actual malware from hiding behind the EICAR test.</p>",
"contentMap": {
"en": "<p>In order to test <a href=\"https://infosec.exchange/tags/antivirus\" class=\"mention hashtag\" rel=\"tag\">#<span>antivirus</span></a> software, the <a href=\"https://en.wikipedia.org/wiki/EICAR_test_file\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EICAR test virus</a> was created:</p><pre><code>X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*<br></code></pre><p>It is 68 bytes of plain ASCII text that also happen to be valid x86 machine code (all it does is output <code>EICAR-STANDARD-ANTIVIRUS-TEST-FILE!</code> and stop). The idea is that AV will treat this harmless file like malware, so you can test whether detection works properly without having to download an actual virus.</p><p>The original <a href=\"https://infosec.exchange/tags/eicar\" class=\"mention hashtag\" rel=\"tag\">#<span>eicar</span></a> spec called for AV to detect any file that starts with this string of 68 bytes. However, in 2002 a Windows batch worm was created that disguised itself as a harmless test file by starting its list of commands with the EICAR string (which causes a \"command not found\" error, but does not prevent the rest of the .bat file from running). If the user had AV installed, it would detect the worm only as a harmless test file.</p><p>To fix this, the <a href=\"https://www.eicar.org/download-anti-malware-testfile/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EICAR spec</a> was updated in 2003. It places the following constraints on the test file:</p><ul><li>It must be 128 bytes long or less.</li><li>The first 68 bytes must be identical to the test string shown above.</li><li>All following bytes (if any) must be from the following set of ASCII characters: space (32), tab (9), carriage return (13), line feed (10), Ctrl-Z (26).</li></ul><p>Anything else will not be detected as the EICAR test virus. This prevents actual malware from hiding behind the EICAR test.</p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/antivirus",
"name": "#antivirus"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/eicar",
"name": "#eicar"
}
],
"replies": {
"id": "https://infosec.exchange/users/barubary/statuses/109315811977585662/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/barubary/statuses/109315811977585662/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/barubary/statuses/109315811977585662/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/barubary/statuses/109315811977585662/likes",
"type": "Collection",
"totalItems": 7
},
"shares": {
"id": "https://infosec.exchange/users/barubary/statuses/109315811977585662/shares",
"type": "Collection",
"totalItems": 3
}
}