Tests and other Media topics

Test your IP version 6 readiness here: http://ip6.nl/

Another test do the vulnerability test on the JQuery version of a webpage: http://domstorm.skepticfx.com/modules?id=529bbe6e125fac0000000003 - http://domstorm.skepticfx.com/modules/run?id=529bbe6e125fac0000000003

A JQuery bookmarklet - http://www.learningjquery.com/2009/04/better-stronger-safer-jquerify-bookmarklet/
It’s a nice little tool that allows you to play around with jQuery on a page that doesn’t already have jQuery loaded and see the results immediately - either “This page is now jQuerified” or “This page was already jQuerified.”

polonus

http://www.screencast-o-matic.com/screenshots/u/Lh/1436024235780-73631.png

Introducing Free Global Website Performance Tool

https://blog.sucuri.net/2015/05/introducing-free-global-website-performance-tool.html?utm_campaign=Performance%20Tool&utm_content=17556994&utm_medium=social&utm_source=googleplus

How fast is your site? You can test here the performance of any of your sites from across the globe.

https://performance.sucuri.net/?utm_campaign=Performance%20Tool&utm_medium=social&utm_source=googleplus

Problems with your Internet connection,
There is something you could do for starters, that is test it:
[Windows-key]r key combination → cmd.exe (in admin mode only, else you are not allowed to flushdns)
nslookup www.quantum.com (your providers address - just a random example)
ipconfig /flushdns
nslookup www.quantum.com 8.8.8.8

Report to a qualified remover here for instance what results you got for 2 nslookup commands.
Of course you could test another dns-entry, do by all means, preferably one that gives DNS-issues/problems for you (in Internet Explorer). Info credits go to Tijs, Tera Honourable Senior Member

polonus

Run your code through the sniffer here: http://squizlabs.github.io/HTML_CodeSniffer/

enjoy,

polonus

A test site for Moble Friendliness of Webpages, also rather interesting for folks like Polonus, volunteer website analyst regarding insecurities on sites. Enjoy this test site, folks, enjoy: http://mobilefriendlytest.website/index.php

polonus (volunteer website security analyst and website error-hunter)

To save offline and analyze - WinHTTrack Website Copier 3.48-21
(Ons fouten en problemen mede te delen)

Ontwikkeling:
Interface (Windows): Xavier Roche
Spider: Xavier Roche
JavaParserClasses: Yann Philippot

(C)1998-2003 Xavier Roche and other contributors
MANY THANKS for Dutch translations to:
Rudi Ferrari (Wyando@netcologne.de)

Bezoek onze webpagina :
http://www.httrack.com

Combined with analyzer SensePost Wikto 2.1. http://sensepost-wikto.software.informer.com/download/
Wikto is Nikto for Windows - but with a couple of fancy extra features including fuzzy logic error code checking, a back-end miner, Google-assisted directory mining and real time HTTP request/response monitoring.

Wikto is not a web application scanner. It is totally unaware of the application (if any) that’s running on the web site. Wikto will not look for SQL injection problems, authorization problems etc. on a web site. It is also not a network level scanner – so it won’t try to find open ports, or see if the web site is properly firewalled. Wikto rather operates between these two levels – it tries to, for instance, find interesting directories and files on the web site, it looks for sample scripts that can be abused or finds known vulnerabilities in the web server implementation itself.

Enjoy, enjoy, but be aware of all the legal implications for your country using the software
only for websites where you have explicit written permission to scan (e.g. websites you own),
in all other circumstances do not scan any website directly - use so-called third party cold reconnaissance scanning.

polonus

Hi my good friends,

Who is using this.
Adopted as a userscript in Tampermonkey → http://downyours.org/?filters_484a7c06c4b8474f8853a42eb790a0dee87fc3f8b64c485cb9ce6832b35dc67b

polonus

Make your own bookmarklets and drag the links created onto your bookmark toolbar in the browser.
Create the bookmarklet yourself here http://mrcoles.com/bookmarklet/ with this code to remove bloat from a page

javascript:(function()%7Balert(%22test!%22)%20javascript%3A(function()%7Bfunction%20R(w)%7Btry%7Bvar%20d%3Dw.document%2Cj%2Ci%2Ct%2CT%2CN%2Cb%2Cr%3D1%2CC%3Bfor(j%3D0%3Bt%3D%5B%22object%22%2C%22embed%22%2C%22applet%22%2C%22iframe%22%5D%5Bj%5D%3B%2B%2Bj)%7BT%3Dd.getElementsByTagName(t)%3Bfor(i%3DT.length-1%3B(i%2B1)%26%26(N%3DT%5Bi%5D)%3B--i)if(j!%3D3%7C%7C!R((C%3DN.contentWindow)%3FC%3AN.contentDocument.defaultView))%7Bb%3Dd.createElement(%22div%22)%3Bb.style.width%3DN.width%3B%20b.style.height%3DN.height%3Bb.innerHTML%3D%22%3Cdel%3E%22%2B(j%3D%3D3%3F%22third-party%20%22%2Bt%3At)%2B%22%3C%2Fdel%3E%22%3BN.parentNode.replaceChild(b%2CN)%3B%7D%7D%7Dcatch(E)%7Br%3D0%7Dreturn%20r%7DR(self)%3Bvar%20i%2Cx%3Bfor(i%3D0%3Bx%3Dframes%5Bi%5D%3B%2B%2Bi)R(x)%7D)()%7D)()

and this code to rewrite redirects

 javascript:(function(){var k,x,t,i,j,p; for(k=0;x=document.links[k];k++){t=x.href.replace(/[%]3A/ig,':').replace(/[%]2f/ig,'/');i=t.lastIndexOf('http');if(i>0){ t=t.substring(i); j=t.indexOf('&'); if(j>0)t=t.substring(0,j); p=/https?\:\/\/[^\s]*[^.,;'">\s\)\]]/.exec(unescape(t)); if(p) x.href=p[0]; } else if (x.onmouseover&&x.onmouseout){x.onmouseover(); if (window.status && window.status.indexOf('://')!=-1)x.href=window.status; x.onmouseout(); } x.onmouseover=null; x.onmouseout=null; }})();

Enjoy,

polonus

https://sitecheck.sucuri.net/?utm_campaign=SiteCheck&utm_medium=social&utm_source=googleplus
https://www.youtube.com/watch?v=su6fAaBAULg&feature=autoshare

Validate your SSL connection strength: https://calomel.org/firefox_ssl_validation.html
You could combine this with the Netcraft extension report.
And of course a Qualys SSL scan: https://www.ssllabs.com/ssltest
or the other tests as given in this thread earlier.

polonus

How fast is your site? You can test here the performance of any of your sites from across the globe.

https://performance.sucuri.net/?utm_campaign=Performance%20Tool&utm_medium=social&utm_source=googleplus

Thanks :slight_smile:

http://www.screencast-o-matic.com/screenshots/u/Lh/1437493822213-53383.png

Here on the avast official support forums various users use all sort of website scan sites.
The results of such scans may set us at ease or
they may encourage us to just look again or avoid to visit a particular website, url, uri…

As our friend Para-Noid has learned us: “You can only trust what you have tested yourself”.

And as his forum friend I’d wholeheartedly agree with this Para_Noid’s credo.
It is a home-ringing truth, my dear avast friends,

Now we may ask in all earnesty: “Who can we really still trust online these days?”.

We have bookmarklets to detect whether a site has JQuery and what (vulnerable) version.
On this fine page we also find fine vulnerability scanners for WP and Joomla CMS results
on websites and more scans and tools: https://hackertarget.com

Another interesting website to find out about what technologies are being used to be used
on a particular website can be found here:
http://pagexray.com/site/ x for x give in the domain of site you wanna check.

enjoy, my good friends, enjoy,

polonus

Various handy utilities to be found here: http://www.nothink.org/utilities.php

Links presented as is. Only to be used when given pertinent written permission to test
or to test on your own website and scripts.

Never go to websites directly, always know your legal position when using scans, if not certain refrain from using,
like with Dazzlepod scan results or Qualys server scan results. The info gained there is not be used against thos scanned.
Qualys Scan Results are not to be given.

You are never to use info gained by cold reconnaissance third party scanning against a particular website/domain. which you do not own. Sometimes you can give a certain scan link (broken), but are not to give the scan result data.

An intersting example of all you can find at this address: http://www.danstools.com/javascript-obfuscate/
Know that in malware loads of so-called pseudo-script and script-obfuscation is used to mislead detection.
so whenever we experiebce obfuscated script it should be a reason to be alert.
As Para-Noid states: “You can only fully trust, what you have tested yourself”.

enjoy, my good friends, enjoy,

Damian

A nice chrome extension to prevent type-behavioral profiling, Keyboard privacy, one you should have:
https://chrome.google.com/webstore/detail/keyboard-privacy/aoeboeflhhnobfjkafamelopfeojdohk

pol

P.S. Where you need secure connection and it does not matter, your bank website for instance, disable the extension.
So toggle to on´ when privacy goes over security, off´ when security goes over privacy.

Keyboord Privacy seems the extension to save Tor users to be de-anonimyzed by their type profile.
The cat and mouse game between protection and monitoring forces goes on and on…

Damian

Create your own bookmarklets using JQuery: http://benalman.com/code/test/jquery-run-code-bookmarklet
and http://benalman.com/projects/run-jquery-code-bookmarklet/

A fine javascript bookmarklet generator is to be found here: http://mrcoles.com/bookmarklet/

To check a webpage for JQuery, look for it here and drag onto the bookmark bar: http://www.learningjquery.com/2009/04/better-stronger-safer-jquerify-bookmarklet

polonus

Analyzing a Facebook Clickbait Worm

https://blog.sucuri.net/2015/06/analyzing-a-facebook-clickbait-worm.html?utm_campaign=Learn%20how%20to%20avoid%20becoming%20a%20victim%20of%20Facebook%20ClickBait%20Blogpost&utm_medium=social&utm_source=googleplus

For VPN users of Chrome, prevent leaking non-public IP addresses with this extension: https://chrome.google.com/webstore/detail/webrtc-network-limiter/npeicpdbkakmehahjeeohfdhnlpdklia
Another protection against this read-out via javascript methods is the use of NoScript, uMatrix, and Tor-Guard.
To diable it in the Google Chrome browser settings, give in in the address bar: “chrome://flags/” and set “Disable WebRTC device enumeration” to on. In firefox in the address bar give in “about:config” and then set “media.peerconnection.enabled” to “false”. Or as said use the versatile overall protection of the NoScript extension in firefox, and uMatrix in Google Chrome.

polonus

Interesting about what your browser knows about you:
https://isc.sans.edu/forums/diary/Psst+Your+Browser+Knows+All+Your+Secrets/16415/

link article author = sally Vandeven

Curious → just open a command prompt and run:

set SSLKEYLOGFILE=c:\sslKeyLogFile.txt

Know that Bitdender products may ruin “SSL” through installing an all purpose root certificate, so one can no longer see the validation path and it also is not checking for revocation.
This can be disabled by locally deleting the root CA and disabling the SSL scan option, so Bitdefender can no longer interfere,
but for users that want to enforce SSL (like with https: everywhere) this is no option.
Forum users that use Bitdefender, and I know some here that are, should be aware of such facts.

Avast has a far better SSL-scanning feature ;D as we know from avast team members here.

We know Mozilla NSS has mentioned feature, MS might have it also,
but then if it was/is the feature never was known to the public.
Info-credits go to Secu_jay.

polonus