Tests and other Media topics

For developer’s best practices and for debuggers alike, all your cheat sheets together online:

Re: http://overapi.com/ A pity you are not allowed to use it, when doing exams.

Also available as an extension: https://chrome.google.com/webstore/detail/all-cheat-sheets/oedodeocfdeegliepeeoieemhdgoijod

For those into websecurity and error-hunting: https://infosec.mozilla.org/guidelines/web_security.html

Enjoy, my good friends, enjoy,

polonus (volunteer website security analyst and website error-hunter)

Net Neutrality Monitor - Monitor and analysis in real-time of the censorship systems used by Internet Service Providers.

Test your ISP for net neutrality: example: http://www.neumon.org/ip/206.165.6.11.html

polonus

Halo Polonus, I have tried link that you share here to check my http header https://smartdigital.id/jasa-seo/ but its show message “unable to connect to HTTP port” and still load more time process than webconfs that I usually use.

A nice website and webserver scanner for a "quick and dirty"scan,
see results: https://www.htbridge.com/https://www.htbridge.com/websec/

Can be combined with results of this scanner: https://sonarwhal.com/scanner/
and other specific scanners like for instance https://privacyscore.org/ & https://urlscan.io/domain
Other aspects can be scanned as well, like jQuery library vulnerability at retire.insecurity.today/#
and dom based issues like sources and sinks via: http://www.domxssscanner.com/ (a Google provided service).

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

This could also help you to find initializer errors in scripts like error: Undefined variable storage, where storage had be changed by ::Storage and then in the controller Storage.put_object_url(…) to no longer get an error like

found JavaScript
error: undefined function storage._each
error: undefined variable storage
for ci.psdev.de/static/61489873/scripts/behavior.js (info credits amonetti on Github’s).

Other related scans: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fpsdev.de
re: https://urlscan.io/result/0f751ff0-71e9-4649-ab52-54e567d86693

All coming from the scan results at: https://www.htbridge.com/websec/ for related https://retire.insecurity.today/#!/scan/7149f4aa52e5c1e085e865b9b15c34cf6da783c323b3b17f1da65f9b9f4e7d50

polonus

EFF starts new project STARTTLS Everywhere to enhance e-mail security:
Example:
https://starttls-everywhere.org/results/?xs4all.nl

polonus

L.S.

When the configuration of STARTTLS is OK, with the right policy list,
and all your hops secured, it is time for automatically enabling HTTPS on your website,
through the use of EEF’s Certbot, go here: https://certbot.eff.org/

polonus

Idiot proof implementation of HTTPS: https://httpsiseasy.com/

polonus

Non-malicious site fails SSLScan. See: https://www.htbridge.com/ssl/?id=JcZI3CnC
Compare to: https://observatory.mozilla.org/analyze/www.overgang.no
Also consider: https://dnssec-analyzer.verisignlabs.com/www.overgang.no
Also see: https://sonarwhal.com/scanner/6b727529-dc3f-4687-9596-08107898f6a1

polonus

Cryptojacking test for your browser: https://cryptojackingtest.com/

Cryptojacking test for your website: https://notmining.org/

Example of the second scanner for https://notmining.org/url?busqueda=http%3A%2F%2Fmejortorrent.com

Last update was on: Tue Jul 10 13:13:11 CEST 2018 . The result of this analyse was: Mining. Detected: CoinHive.Anonymous (coinhive.com)

polonus (volunteer website security analyst and website error-hunter)

Online Interactive JavaScript Cheat Sheet for developer and debugger alike:
https://htmlcheatsheet.com/js/

Enjoy, my good friends, enjoy,

polonus

How are the results like in this Cryptojacking campaign report are being searched?

Example: https://pastebin.com/gYkbVP8b (some blockers block this link, link for researchers only, temporalily unblock in this case).

This is the searchengine they use: https://publicwww.com

Consider this: https://publicwww.com/websites/cryptojacking+/

And one finds further insights like these: https://www.csoonline.com/search?query=cryptojacking+websites&contentType=article%2Cresource

Enjoy, my good friends, enjoy,

polonus

Coming from here: https://www.htbridge.com/websec/?id=Cpy7Tv2c
We stumbled upon: -http://www.baberesto.com/jquery/jquery-1.8.3.min.js

Attackers often hide backdoors, crypto jacking malware and other malicious code inside of legitimate third-party JS (various libraries and frameworks). We check if a particular version of the third-party JS code was altered with a new code, and report any anomalies here. The JS seems to match the original code. The following JS component were found inside:- jQuery [1.8.3]
Then we scanned - https://retire.insecurity.today/#!/scan/641317ed91f88ae93e9067610c473dfcd9e2d68cf1aa721f4c47884ec7e9a1be

And then did a query with “” here: https://publicwww.com/websites/“%2Fjquery%2Fjquery-1.8.3.min.js”/
coming up with potentially 18774 websites in 5.14 s. with this medium secerity vulnerability:

Detected libraries: jquery - 1.8.3 : (active1) hxtp://www.baberesto.com/jquery/jquery-1.8.3.min.js Info: Severity: medium http://bugs.jquery.com/ticket/11290 http://research.insecurelabs.org/jquery/test/ Info: Severity: medium https://github.com/jquery/jquery/issues/2432 http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/ http://research.insecurelabs.org/jquery/test/ Info: Severity: medium https://bugs.jquery.com/ticket/11974 http://research.insecurelabs.org/jquery/test/ (active) - the library was also found to be active by running code 1 vulnerable library detected

error(s) inside this javascript code:

wXw.baberesto.com/jquery/jquery-1.8.3.min.js
status: (referer=http:/XXX/web?q=puppies)saved 93636 bytes 06e872300088b9ba8a08427d28ed0efcdf9c6ff5
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined function p.getElementsByTagName
error: undefined variable p
info: [element] URL=wXw.baberesto.com/jquery/undefined
info: [1] no JavaScript
file: 06e872300088b9ba8a08427d28ed0efcdf9c6ff5: 93636 bytes
file: d5dba94a76a67a54f2b98b16227da20414542fd9: 72 bytes
→ leading to wXw.baberesto.com/jquery/undefined

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

An iOT Cyber Space search-engine to use next to shodan: https://www.zoomeye.org/searchResult?q=%2Fjquery-1.9.1.min.js

Read: https://twitter.com/ankit_anubhav/status/1017426076467855360 because of
https://depthsecurity.com/blog/dahua-dvr-authentication-bypass-cve-2013-6117

polonus

Testing websites for tracking.

Check websites for tracking here (example): https://whotracks.me/trackers/snigelweb.html

and compare with a scan at (same example): https://privacyscore.org/site/111090/
ANALYZED URL AFTER LOADING:
-http://www.snigelweb.com/ site is using 17 known tracking- or advertising companies.
Vulnerable to the SWEET32 attack.

ANALYZED MAIL SERVER:
-aspmx.l.google.com

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

Tracking is hot and there is almost no avoiding it. So you’d better know who’s tracking you out of your sock(et)s :wink:

See this one, a site that I would block for malicious ad-redirecting.

Explore the data on this page: https://whotracks.me/websites/bulbagarden.net.html

Now compare with this Tracker Tracker report :

host distinct names name frequencies
-https://sb.scorecardresearch.com/beacon.js 1 ScoreCard Research Beacon (1)
1 ADTECH (1)
-https://bulbapedia.bulbagarden.net 8 OpenX (1) DoubleClick (3) ScoreCard Research Beacon (1) Google Tag Manager (1) Google Analytics (2) Twitter Button (1) ZergNet (1) Econda (1)
-https://Q1MediaHydraPlatform·com/ads/video/controller·php?qid=57d6d4bcdbcb6cda37200d1d&qz=1 1 (1)
-https://forums.bulbagarden.net/js/apantic/profilepostlimit/profile_post_limit.min.js?_v=3b17caa1 1 (1)

We tracked using these URLs

-https://Q1MediaHydraPlatform·com/ads/video/controller·php?qid=57d6d4bcdbcb6cda37200d1d&qz=1
-https://sb.scorecardresearch.com/beacon.js
-http://adserver.adtechus.com/addyn/3.0/5259.1/2787268/0/277/ADTECH;apid=1A8b2d8494-89ab-11e8-b592-d89d671a1f74;cfp=1;rndc=1531823050;loc=100;target=_blank;key=key1+key2+key3+key4;grp=405;misc=1531823049959
-https://bulbapedia.bulbagarden.net
-https://forums.bulbagarden.net/js/apantic/profilepostlimit/profile_post_limit.min.js?_v=3b17caa1

But there are more links: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=bulbagarden.net&ref_sel=GSP2&ua_sel=ff&fs=1

No specifics alerted here: http://isithacked.com/check/http%3A%2F%2Fbulbagarden.net%2F

polonus

Results may differ 17 trackers in one report, 18 trackers found up in the second:
https://whotracks.me/websites/tripadvisor.de.html versus https://privacyscore.org/site/42802/

Also see here: https://trackography.org/
For instance data in the Netherlands go to com.score public TV → -b.scorecardresearch.com (from nos.nl)

polonus

Nice Google JavaScript online compiler service:
https://closure-compiler.appspot.com/home

Repository of such tools: https://mvnrepository.com/artifact/com.google.javascript/closure-compiler

enjoy,

polonus

Is your website ready for the latest technology or rather ready for the “Hall of Shame”?

Checking a Hall of Shame site.

[b]New checksite: https://en.internet.nl/site/phenoelit.org/338066/[/b]

Compare with existing website testing sites, like:
https://securityheaders.com/?q=http%3A%2F%2Fphenoelit.org%2F
and https://www.htbridge.com/websec/?id=DnFHnhuc
and https://observatory.mozilla.org/analyze/phenoelit.org

Enjoy, my good friends, enjoy,

polonus (volunteer third party cold reconnaissance website security analyst and website error-hunter)

P.S. I do not advise regular users go here: -http://seurat.0xffffffff.net/ (developer and network hacking)
but with the right mind-set and being into security, one could learn a lot about insecurity of protocols
(white hat relevant knowledge, ignore the other darker material out there)

Damian

Are you or your devices not on Shodan?

Scan for it here: https://iotscanner.bullguard.com/

Enjoy, I was not on Shodan and secure via the deepscan results. How about you?