Halo Polonus, I have tried link that you share here to check my http header https://smartdigital.id/jasa-seo/ but its show message “unable to connect to HTTP port” and still load more time process than webconfs that I usually use.
This could also help you to find initializer errors in scripts like error: Undefined variable storage, where storage had be changed by ::Storage and then in the controller Storage.put_object_url(…) to no longer get an error like
found JavaScript
error: undefined function storage._each
error: undefined variable storage
When the configuration of STARTTLS is OK, with the right policy list,
and all your hops secured, it is time for automatically enabling HTTPS on your website,
through the use of EEF’s Certbot, go here: https://certbot.eff.org/
Attackers often hide backdoors, crypto jacking malware and other malicious code inside of legitimate third-party JS (various libraries and frameworks). We check if a particular version of the third-party JS code was altered with a new code, and report any anomalies here.
The JS seems to match the original code.
The following JS component were found inside:- jQuery [1.8.3]
Then we scanned - https://retire.insecurity.today/#!/scan/641317ed91f88ae93e9067610c473dfcd9e2d68cf1aa721f4c47884ec7e9a1be
Detected libraries:
jquery - 1.8.3 : (active1) hxtp://www.baberesto.com/jquery/jquery-1.8.3.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://bugs.jquery.com/ticket/11974
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
1 vulnerable library detected
error(s) inside this javascript code:
wXw.baberesto.com/jquery/jquery-1.8.3.min.js
status: (referer=http:/XXX/web?q=puppies)saved 93636 bytes 06e872300088b9ba8a08427d28ed0efcdf9c6ff5
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined function p.getElementsByTagName
error: undefined variable p
info: [element] URL=wXw.baberesto.com/jquery/undefined
info: [1] no JavaScript
file: 06e872300088b9ba8a08427d28ed0efcdf9c6ff5: 93636 bytes
file: d5dba94a76a67a54f2b98b16227da20414542fd9: 72 bytes
polonus (volunteer third party cold reconnaissance website security analyst and website error-hunter)
P.S. I do not advise regular users go here: -http://seurat.0xffffffff.net/ (developer and network hacking)
but with the right mind-set and being into security, one could learn a lot about insecurity of protocols
(white hat relevant knowledge, ignore the other darker material out there)