Were your mail accounts ever been compromised?
[i]Find out here: https://monitor.firefox.com/scan[/i]

For one of my mail accounts this showed up, have long changed passwords in the mean time.

Example: Malwarebytes Breach date:November 15, 2014 Compromised accounts:111,623 Compromised data:Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity

Breach data are being provided by: https://www.haveibeenpwned.com/

N.B. If you feel uncomfortable scanning, do not!
I know of several users here on the forums, that won’t risk going to haveibeenpwned dot com for instance.

Damian aka polonus

Fun Countdown Clock:
https://www.timeanddate.com/counters/newyear.html?p0=534

pol

Abuse IP base: https://www.abuseipdb.com/check/5.188.10.76
Bad ip resource to check against: https://www.bytefarm.ch/fail2ban/
Reporting: ip hostname tor country filter(s) first reported last reported hits reported by’…’
-5.188.10.76 -5.188.10.76 n [RU] Russian Federation sshd 06.06.2018 15:46.03 GMT+0200 13.09.2018 00:08.37 GMT+0200 11 2 host(s)

On belated reporting read: https://abuse.ch/blog/measuring-reaction-time-of-abuse-desks/

and check: https://urlhaus.abuse.ch/browse.php?search=5.188.10.76

Another interesting SSL resource bad certs: https://sslbl.abuse.ch/

Incidents as detected on AS: (random example) https://abuse.shaunc.com/incidents/about/AS16276/

A fail2ban repository from a home address: https://jackfarrand.uk/admin/

Another resource: https://packettotal.com/app/analysis?id=7b770d9a70d575f66e8778b0bb5bdf8e&name=conn

list of bruteforcers: https://home.nuug.no/~peter/bruteforcers.txt

attackers going on: https://attackers.ongoing.today/httpd.txt

another drop of attackers: https://report.cs.rutgers.edu/DROP/attackers

SSH honeypot: https://otx.alienvault.com/pulse/5b8fd4d62f7c866a98fcf80b

spam emitters: https://www.megarbl.net/asncheck/AS16276

POWER DNS queries for non-existent records for existing domains:
https://ns1.fast.qa/?ring=nxdomain-queries

So some lists abuse galore >:( :smiley:

polonus

Links to check on spam-IPs:
Found at: https://github.com/stamparm/ipsum in it’s Hall of Shame.
Checked for higher miniFraud Score: https://www.maxmind.com/en/high-risk-ip-sample/171.25.193.25
Forum spam checker: https://www.stopforumspam.com/ipcheck/171.25.193.25
At project honeypot’s: https://www.projecthoneypot.org/ip_171.25.193.25
Green Snow list: https://greensnow.co/view/171.25.193.25
WatchGuard RepAuthority’s list check: http://www.reputationauthority.org/lookup.php?ip=tor-exit5-readme.dfri.se
In beta: http://beta.brightcloud.com/tools/url-ip-lookup.php

Enjoy, my friends, enjoy,

polonus

P.S. And to say with my good friend, Pondus, it is always a good idea to check IPs against VT:
https://www.virustotal.com/#/ip-address/171.25.193.25

Damian

Known CMS still accept older PHP versions and accordingly vulnerabilities (Drupal, Joomla, Word Press)

Check your code online at the PHPStan Playground…
checked vulnerable code like

<?
session_start();
include (“…/config.php”);
echo $loggedin;

if ($loggedin != “1”){
header(“Location: http://www.google.com”); /* Redirect browser */

}

{
echo “Will this code Get executed?”;
}?>


Where we stumble upon
unexpected T_STRING, expecting ‘;’
in line 12 - While testing a web application today, i noticed an unusual 302 HTTP response. Normally a 302 response just has a header and no html code, becuase its meant to be redirecting you to the page cited in the ‘Location’ field of the http header.� The 302 response had the html code which will be presented to the authenticated admin user, but, we didnt have the admin credentials. So, how are we seeing this code. After analyzing the 302 redircect response, we concluded that this was the result of insecure coding. Info credits go to Tesjawi.

So not escaping quotes in the string, of course it’s not going to work.
Just add a \ before the " in the tag and you are good to go.
(pol).

Check with PHP malware finder: https://github.com/nbs-system/php-malware-finder/

Enjoy, my good friends, enjoy, and remember PHP often can be inherently insecure.

Encrypted with Yellowpipe’s Code Source Encrypter it looks like

file: 368a84ccc831bea70c7649b7ce50c0abea9c4557: 412 bytes
file: c01a81e4621b7a3059b2257cffb9f2c743efd250: 223 bytes

Decoded Files
368a/84ccc831bea70c7649b7ce50c0abea9c4557 from script (412 bytes, 4 hidden) download
coded source: c01a/81e4621b7a3059b2257cffb9f2c743efd250 from script (223 bytes)

polonus

Pages to test your ad-blocker performance: https://pi-hole.net/pages-to-test-ad-blocking-performance/

Read: https://www.raymond.cc/blog/10-ad-blocking-extensions-tested-for-best-performance/

Another test: https://ads-blocker.com/testing/

Pecular subliminal adtest: https://ads-blocker.com/subliminal-advertising/ (not for minors!)
Also see: https://ads-blocker.com/block-referral-spam/

polonus

A not so known browser leak is known as TLS session resumption tracking,
set per default for seven days in stead of the 10 hours several known security researchers propose.

This tracking is even more of a problem on Android devices ,
where the browser sessions could stay open much longer.

Both facebook and google to abuse this security protocol for (third party) user tracking and moniotoring.
When the user blocks an ad-tracking way, they find a way around this either this or that way.
It is just a big uneven cat and mouse game.

Read: Lees: https://www.theregister.co.uk/2018/10/19/tls_handshake_privacy/

But there many more ways to track someone through a browser at the cost of privacy.

Test: Notable testing websites:

https://browserleaks.com/

https://whoer.net/

https://ip-check.info/?foundHTTPS=true

https://panopticlick.eff.org/

https://www.doileak.com/

Also read here: https://www.reddit.com/r/privacy/comments/8221hn/tob_ios_browser_vs_duck_duck_go_ios_browser_vs/
Do not understand why some block reddit now as being a form of “fake news”?

polonus (volunteer website security analyst and website error-hunter)

Feeds: https://app.cymon.io/feeds with various malware trackers.

There is loads, like this one: https://urlhaus.abuse.ch/browse/

polonus

Multiple 0-days in Magecart: https://gwillem.gitlab.io/2018/10/23/magecart-extension-0days/

An older object injection exploit from 2014 was again being used:
Re: https://websec.wordpress.com/2014/12/08/magento-1-9-0-1-poi/

And dangerous PHP function was being abused: http://php.net/manual/en/function.unserialize.php

Check: https://www.functions-online.com/unserialize.html

polonus

Interesting virtual representation on malware analysis:
https://app.any.run/tasks/e15b7ee2-5977-4b8d-b2d7-4a1c74236c52
Also see: https://app.any.run/submissions
and https://report.any.run/44c359341f1956e45ed284befb27115db2c4ef78a123234fcbbd18948d109696/0bc676ad-8d64-466f-b9fd-ad3327963fe6#generalInfo

polonus

Any.Run - An Interactive Malware Analysis Tool - Is Now Open To The Public
https://www.bleepingcomputer.com/news/security/anyrun-an-interactive-malware-analysis-tool-is-now-open-to-the-public/

Whenever javascript error hunting is your thingie, this YouTube video is just for you: https://www.youtube.com/watch?v=0dgmeTy7X3I
Very illustrative and instructing presentation.

It is interesting how security mechanisms within core-packages still can be circumvented by respresenting code in some other form, for instance via type manipulation. Just think about the sheer number of some 375.000 packages for node.js alone, where such insecurities may lure around the corner!

Also consider how these packages could impact each other. How they could kick up insecurity through the eco-system. Think of angular.js via %2e/%2e/etc. & alert(1) to circumvent inbuilt safety code.

Is code being skimmed and screened for such errors and insecurity, because we cannot do this automatically? Always a pair of eyes are needed to do this properly.

Fine presentation via the Snyk platform and various vulnerabilities presented for json javascript libraries and ways to compromise ready-made. Read: https://snyk.io/ One could also test code there online.

Example in apis.google.com/js/plusone.js with errors detected in undefined function $ and a Syntax error, see: https://gist.github.com/ashumeow/34c11dcff0f7b2920364 → Try to open this inside codepad, Undeminished plusone.js has 377 lines of code, (info source credits go to luntrus).

enjoy, my friends, enjoy,

polonus

As I found the dom-xss online scanner now almost constantly producing a “503 Over Quota”,
Hey, Google, give that site another swing?!?

So I looked for an alternative.

Another test site full of tests here: https://find-xss.net/tests/?test_id=1&l=en
Also to test your score of xss vulnerability patterns.
Just for training and protection purposes.

(Do not use these info for evil purposes, as that will put you in trouble with authorities)

polonus

Online analysis of some malware:
Where we found it: https://urlquery.net/report/7788ed09-00cf-47dc-93f1-f5a63adb6c83
Online analyses:
https://www.hybrid-analysis.com/sample/da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c?environmentId=100
and: https://www.maltiverse.com/sample/092055023937e87f7926f1905c0ddf23fc85d33e987594e5535b3f995df7931e
and:
https://report.any.run/c1ada39372a4c755098718feaf45d6f7bb389a680e71944352ea2bcb63f146e4/4521ac0e-cc80-434e-9d5f-e90c155785f6
and on IP: https://cymon.io/188.209.52.136
And on security: https://www.htbridge.com/websec/?id=3jqvV8qK
Oversight: https://support.clean-mx.com/clean-mx/viruses.php?country=nl
and here: https://support.clean-mx.com/clean-mx/xmlviruses?response=alive&format=xml&fields=review,url&sa=U&ei=3p2eU8vjH4PwPLbWgJgG&ved=0CBQQFjAA&usg=AFQjCNFW6BPj8vKD_Fo-5fZfTFMi2DNXfw

enjoy, my good friends, enjoy,

polonus

Scanner has come to end of lifetime: (was started in 2011)
https://www.troyhunt.com/its-end-of-life-for-asafaweb/

Still there are other valuable scanners online, for instance:
https://codebeautify.org/jsvalidate

polonus

You own a website that runs Word Press CMS Content Management Software),
Just check it from time to time,
using the following online scan engines:

https://urlquery.net/
https://sitecheck.sucuri.net
https://hackertarget.com/wordpress-security-scan/
https://retire.insecurity.today/#
https://webhint.io/scanner/
https://aw-snap.info/file-viewer/
https://observatory.mozilla.org/?

Follow up the recommendations found there or inform your web-admin/hoster of security issues detected.

Always use last versions of core-software, theme-software and plug-in software.
Update en Patch continuously , also mind to update PHP.
Retire vulnerable JQuery script(s).

Whenever in doubt post in the “virus and worms” section, and wait for a reaction.

Stay safe and secure,

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

Relations from searching for a malicious IP address.
We started out here: https://www.maltiverse.com/dashboards/newioc
and found this malicious Toolbar.Conduit executable: https://www.maltiverse.com/sample/b2c78409224552a0522cd218f08b9aea18b47f2accaff3b6068c20519c5d63c2
From that hash we stumbled upon: https://www.virustotal.com/pl/file/b2c78409224552a0522cd218f08b9aea18b47f2accaff3b6068c20519c5d63c2/analysis/
and also searched at urlquery dot net: https://urlquery.net/report/a2dbd597-f2a8-4536-bffa-4c69afa4c14e
which delivered a bad request alert for us.
This while we also had these resources: https://www.malwareurl.com/ip_listing.php?ASN=AS22822
and https://www.threatcrowd.org/domain.php?domain=s.delvenetworks.com
or: https://packettotal.com/app/analysis?id=c1a3a5f6393a42e9015251c23cc58c56&name=http
and https://www.threatminer.org/ssl.php?q=66fbc4c6f3788d27a2218571055d8076ef1297e8

IP and hash searches really make sense to find out what malware or suspicious activity lies behind a certain IP address or a specific hash stands for, like:

SHA256: b2c78409224552a0522cd218f08b9aea18b47f2accaff3b6068c20519c5d63c2
Nazwa pliku: uTorrent.exe
Współczynnik wykrycia: 6 / 67
Data analizy: 2018-10-23 06:59:10 UTC ( 3 tygodnie, 4 dni temu )

polonus (volunteer website security analyst and website error-hunter)

To enable security passed between two parties via JSON Web Tokens.

Editing JSON Web Tokens at jwt.io -Example > eyJhbGciOiJIUzI1NiJ9.e30.FXibJVNHsvJ6Ff-N9XtTTom9cGExRqsldHbrhAOqRUg
HEADER:ALGORITHM & TOKEN TYPE

{
“alg”: “HS256”
}
PAYLOAD:DATA

{}
VERIFY SIGNATURE

HMACSHA256(
base64UrlEncode(header) + “.” +
base64UrlEncode(payload),

your-256-bit-secret

) secret base64 encoded
Signature Verified
Libraries for Token Signing/VerificationFILTER BY
Warning: Critical vulnerabilities in JSON Web Token libraries with asymmetric keys. Learn more
Then follow the checks…

Securely implement authentication with JWTs using Auth0 on any stack and any device in less than 10 minutes.

TOKENS CREATED
Supported byMissing something?Send a Pull Request-License

Enjoy, my good folks, enjoy,

polonus

Website scan sites come and go.

We lost asafaweb scan, which has reached End of Life.
Interesting website scanner is UpGuard Cloud Scanner: https://webscan.upguard.com/#/
Website Health Check: https://webscan.foregenix.com/
WebScan: https://www.htbridge.com/websec/

Some things lost, some things gained,

polonus

Just to present you with the results of above mentioned scanners for and on this next website
https://urlquery.net/report/ea1db0cd-562a-43f3-811a-15464bac12f9
We will see various issues on security check-ups here: https://webscan.upguard.com/#/http://passmcsa.com
Bad security headers in Word Press detected: https://webscan.foregenix.com/webscan_results.html?scanid=e65cd8d6_06cb_4230_80f0_5d258de9d5ef
F-grade test result: https://www.htbridge.com/websec/?id=DZMx7uMz
Of course we have to add specific Word Press check results": user enumeration not disabled and directory listing not disabled via
https://hackertarget.com/wordpress-security-scan/
and 1 vuln. jQuery library to be retired → https://retire.insecurity.today/#!/scan/7ee81e4693c6039d7b6b0debe1cc68c908ddd9a7c36e7a014a22b3a68a12a52d

Interesting on website is that we found that the bootstrap code was altered (there were recent bug errors),
at a final note this scan qualifying the website as clean: https://quttera.com/detailed_report/passmcsa.com
but what’s that verdict worth in the light of all security recommendations web admins had better heed,

polonus