One knows polonus checks for retirable jquery libraries, including node js, using online retire js scanner,
There is also a way to check node.js for insecurety: snyk open source .
One can do a test for azure (azure@2.2.1-preview) and test e.g. “tunnel agent” in for instance Brave browser on android and we will get 9 issues, “do not use callbacks” for one.
Install → npm install -g snyk d -/projects/myproj/
snyk test
Polonus was away for the week to central Poland, temp now minus 8 Celsius.
While not much online here last week on these here forums,
polonus is as always continuously on the look-out for script-security improvement of any sort.
I and a younger IT friend of mine stumbled onto this super script from the renowed resource engineer
& open source security researcher, zx2c4, from Paris, France.
As we find in his to do list inside the code there is still some work to be done on detecting async scripts,
and through going over StackOverflow’s solutions, and thnx to Cookie_Monster there, we stumbled upon:
Could there be a possibility secure.js could be adopted & enhanced in such a way?
Still waiting from a response from Jason Donenfeld (aka zx2c4) accordingly,
polonus (volunteer website security analyst and website error-hunter)
Tor will not anonymize you, in combination with tails also not fully anonymize ye, recorded is the size of your browser window open for instance, and other unique identifiers like typing habits/speed/anomalities, websites visited etc.
Using tails in combination with a VM is a bad idea, it can unveil your OS identification. Using tot and tails and a vpn a la default is always a bad idea for hackers and cybercriminals alike. You get caught period.
Also be aware of correlation attacks, targeted malware injection, and time-based attacks.Also never share privacy related data online or break your online habits. These mistakes has caused many a perpetrator quite some jailtime.
So better do not do the crime, if you cannot do the time.
polonus (volunteer website security analyst and website error-hunter)
In short: Set “media.peerconnection.enabled” to “false” in “about:config”.
Explained:
Enter “about:config” in the firefox address bar and press enter.
Press the button “I’ll be careful, I promise!”
Search for “media.peerconnection.enabled”
Double click the entry, the column “Value” should now be “false”
Done. Do the WebRTC leak test again.
If you want to make sure every single WebRTC related setting is really disabled change these settings:
This is a POC - DO NOT use it for a production environment Info credits goes to thecker at Github Today
Checking this POC code against facebook’s proxygen-bolt → https://github.com/lhecker/libnodecc
Do not use libnodecc in a developer’s production environment, just for research experiments only.
See: https://urlscan.io/result/3b26405e-cc14-49fb-ba92-e2e2f8be0368/jsonview/
and https://urlquery.net/report/c85aceb0-5456-4363-ad7f-b9bb3e960636
proxygen-bolt unrecognized despite returning data
There always should be room for PHP (in)security testing: Security Checks for -static.xx.fbcdn.net Verdict of insecurity:
(2) Susceptible to man-in-the-middle attacks
HSTS header does not contain includeSubDomains
HSTS header not prepared for preload list inclusion
Vulnerable to cross-site attacks
HttpOnly cookies not used
error to go onto
-static.xx.fbcdn.net/rsrc.php/v3iCvN4/yt/l/DE/iNEySX6agJT.js benign
info: [decodingLevel=0] found JavaScript
error: undefined variable __d
error: undefined function __d
nested undefined variable error, when you try to grab, but you do not see what is run…(pol).
polonus (volunteer website security analyst and website error-hunter)
console.log(result);
var jsTokens = require(“js-tokens”).default
var jsString = “var foo=opts.foo;\n…”
jsString.match(jsTokens)
// [“var”, " ", “foo”, “=”, “opts”, “.”, “foo”, “;”, “\n”, …]
import {matchToToken} from “js-tokens”
// or:
var g = 9.82
var number = bar / 2/g
With Word Press plug-ins there is a possibility to get errors wih a certain plug-in that overwrites,
Press F 12 and inspect in the browser console what file causes this.
First thing to do now is to de-activate the plug-in, and a second solution is to remove the code,
but in that case you have to know your javascript a bit.
[b]
Quote info credits and thanks for the instruction goes out to Jasminder Pal Singh [/b],
who instructed this method to me via an online video.
polonus (volunteer website security analyst and website error-hunter)
Above link for IT specialists and researchers only.
We also checked it here and found out why it failed: DNSsy Report Results
Results for 165.38.101.151.in-addr.arpa
Test Results Status
Checking domain format: Hostname looks good. Pass
Checking for parent nameservers: Found 6 parent nameservers. Pass
Checking for parent glue: Found glue from root nameservers to parent nameservers. Info
NS records at parent nameserver: Your NS records at your parent nameserver are:
Provided by e.in-addr-servers.arpa → pri.authdns.ripe.net Info
Nameservers listed at parent: No nameservers found at parent nameserver. Fail
h@8.8.4.4 (Default):
Usage: dig [@global-server] [domain] [q-type] [q-class] {q-opt}
{global-d-opt} host [@local-server] {local-d-opt}
[ host [@local-server] {local-d-opt} [...]]
Where: domain is in the Domain Name System
q-class is one of (in,hs,ch,...) [default: in]
q-type is one of (a,any,mx,ns,soa,hinfo,axfr,txt,...) [default:a]
(Use ixfr=version for type ixfr)
q-opt is one of:
-x dot-notation (shortcut for reverse lookups)
-i (use IP6.INT for IPv6 reverse lookups)
-f filename (batch mode)
-b address[#port] (bind to source address/port)
-p port (specify port number)
-q name (specify query name)
-t type (specify query type)
-c class (specify query class)
-k keyfile (specify tsig key file)
-y [hmac:]name:key (specify named base64 tsig key)
-4 (use IPv4 query transport only)
-6 (use IPv6 query transport only)
-m (enable memory usage debugging)
d-opt is of the form +keyword[=value], where keyword is:
+[no]vc (TCP mode)
+[no]tcp (TCP mode, alternate syntax)
+time=### (Set query timeout) [5]
+tries=### (Set number of UDP attempts) [3]
+retry=### (Set number of UDP retries) [2]
+domain=### (Set default domainname)
+bufsize=### (Set EDNS0 Max UDP packet size)
+ndots=### (Set NDOTS value)
+edns=### (Set EDNS version)
+[no]search (Set whether to use searchlist)
+[no]showsearch (Search with intermediate results)
+[no]defname (Ditto)
+[no]recurse (Recursive mode)
+[no]ignore (Don't revert to TCP for TC responses.)
+[no]fail (Don't try next server on SERVFAIL)
+[no]besteffort (Try to parse even illegal messages)
+[no]aaonly (Set AA flag in query (+[no]aaflag))
+[no]adflag (Set AD flag in query)
+[no]cdflag (Set CD flag in query)
+[no]cl (Control display of class in records)
+[no]cmd (Control display of command line)
+[no]comments (Control display of comment lines)
+[no]question (Control display of question)
+[no]answer (Control display of answer)
+[no]authority (Control display of authority)
+[no]additional (Control display of additional)
+[no]stats (Control display of statistics)
+[no]short (Disable everything except short
form of answer)
+[no]ttlid (Control display of ttls in records)
+[no]all (Set or clear all display flags)
+[no]qr (Print question before sending)
+[no]nssearch (Search all authoritative nameservers)
+[no]identify (ID responders in short answers)
+[no]trace (Trace delegation down from root)
+[no]dnssec (Request DNSSEC records)
+[no]nsid (Request Name Server ID)
+[no]sigchase (Chase DNSSEC signatures)
+trusted-key=#### (Trusted Key when chasing DNSSEC sigs)
+[no]topdown (Do DNSSEC validation top down mode)
+[no]multiline (Print records in an expanded format)
+[no]onesoa (AXFR prints only one soa record)
global d-opts and servers (before host name) affect all queries.
local d-opts and servers (after host name) affect only that lookup.
-h (print help and exit)
-v (print version and exit)
Example output:
nimbus.bitdefender.net@8.8.4.4 (Default):
nimbus.bitdefender.net. 21599 IN CNAME elb-nvi-amz.nimbus.bitdefender.net.
elb-nvi-amz.nimbus.bitdefender.net. 21599 IN CNAME kube-nimbus-1671728955.us-east-1.elb.amazonaws.com.
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.204.39.25
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.203.98.12
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.203.77.162
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.205.81.93
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.45.231.34
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.45.221.142
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.44.27.79
kube-nimbus-1671728955.us-east-1.elb.amazonaws.com. 20 IN A 52.21.175.100