SSL and TLS checking:

Background read: https://isc.sans.edu/forums/diary/Psst+Your+Browser+Knows+All+Your+Secrets/16415/

Check: https://www.cdn77.com/tls-test

http://ssl-checker.online-domain-tools.com/

various tools e.g.: https://www.digicert.com/help/

Dane TLS check: https://www.huque.com/bin/danecheck

various tools here, e.g.: https://mxtoolbox.com/problem/smtp/smtp-tls

Discontinued service: https://cryptoreport.websecurity.symantec.com/

enjoy, my good friends, enjoy,

polonus

Websites that frustrate the use of alternative browsers:
https://www.theregister.co.uk/2002/10/25/alternative_browser_villains_named/

Banks and Linux Browsers - a (in)compatibility oversight:
http://www.starnix.com/banks-n-browsers.html

Mozilla Browser Doh policy was attacked by regulators because it helps in circumventing UK provider filters,
Mozilla now is seen as a kind of a "villain"browser by UK providers.
The only reason is because providers now have to look for alternative ways to make their content filters function.

polonus

Privacy issues and security issues are often related.

How to scan for them?

  1. Rendering as a normal browser would - extensive report:
    https://webcookies.org/cookies/dmstreeremoval.com.au/27913092?662402

  2. 2 vulnerable and retirable jQuery libraries detected:
    https://retire.insecurity.today/#!/scan/875a8bdadc0d2f7b324b9f54c858fd715e6306b13b290027a63c362f60401a12

  3. Data Layer check: 2{data} Show (2)
    {
    “0”: “config”,
    “1”: “UA-109165814-1”
    }
    &
    {
    “0”: “js”,
    “1”: “2019-07-11T14:12:41.413Z”
    }

  4. Trackers: Track From To Action

-dmstreeremoval.com.au -dmstreeremoval.com.au

-dmstreeremoval.com.au -dmstreeremoval.com.au

-dmstreeremoval.com.au -dmstreeremoval.com.au

-fonts.googleapis.com -fonts.googleapis.com

  1. Always considerate these scan results: https://www.virustotal.com/gui/url/9fafcfbfa5bdd5456d5c525427d8808cb17b9d8c09697cafd03c5a1bbcb80903

  2. Overall warnings: https://privacyscore.org/site/141978/

cache control, x-frame-options, content-security-policy headers not set or not following best policies.
No form autocomplete settings set. source RECX Security Analyser extension results.

  1. 1 out of 10 risk on https://toolbar.netcraft.com/site_report?url=https%3A%2F%2Fdmstreeremoval.com.au%2F

  2. detections on IP relations: https://www.virustotal.com/gui/ip-address/162.243.29.224/relations

  3. Mainly check for cloaking and weird redirects, not here: http://isithacked.com/check/https%3A%2F%2Fdmstreeremoval.com.au%2F

  4. DOM-XSS results:

Results from scanning URL: -https://dmstreeremoval.com.au Number of sources found: 4 Number of sinks found: 249

Results from scanning URL: -https://dmstreeremoval.com.au/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Number of sources found: 32
Number of sinks found: 13

Results from scanning URL: -https://dmstreeremoval.com.au/wp-content/plugins/photoswipe-masonry/photoswipe-masonry.js?ver=4.9.8
Number of sources found: 14
Number of sinks found: 4

Results from scanning URL: -https://dmstreeremoval.com.au/wp-content/plugins/photoswipe-masonry/photoswipe-dist/photoswipe-ui-default.min.js?ver=4.9.8
Number of sources found: 12
Number of sinks found: 2

Results from scanning URL: -https://dmstreeremoval.com.au/wp-includes/js/jquery/ui/core.min.js?ver=1.11.4
Number of sources found: 44
Number of sinks found: 33

Results from scanning URL: -https://dmstreeremoval.com.au/wp-content/plugins/kiwi-logo-carousel/third-party/jquery.bxslider/jquery.bxslider.js?ver=4.9.8
Number of sources found: 12
Number of sinks found: 12

  1. Also a scan for PHP driven Word Press CMS at https://hackertarget.com/wordpress-security-scan/
    Reputation Check
    PASSED
    Google Safe Browse: OK
    Spamhaus Check: OK
    Abuse CC: OK
    Dshield Blocklist: OK
    Cisco Talos Blacklist: OK
    Web Server:
    Apache/2.4.6
    X-Powered-By:
    PHP/7.1.8
    IP Address:
    -162.243.29.224
    Hosting Provider:
    DigitalOcean
    Shared Hosting:
    276 sites found on -162.243.29.224

  2. Outdated software on webserver and for Word Press and missing security headers qualified a a High Risk site at:
    https://sitecheck.sucuri.net/results/https/dmstreeremoval.com.au

  3. Total of 13 direct threats detected here: https://app.upguard.com/webscan#/https://dmstreeremoval.com.au
    Security Checks for -https://dmstreeremoval.com.au

(2) Vulnerabilities can be uncovered more easily (4) Susceptible to man-in-the-middle attacks Vulnerabilities (2) Emails can be fraudulently sent (3) Unnecessary open ports DNS is susceptible to man-in-the-middle attacks
  1. https://urlscan.io/result/9cf81b77-d79f-4aa5-9d65-ce5be4f715c8

Verdict non-malicious non-suspicious site, outdated software and server software, so High Risk website,
various security issues and missing best policies being implemented. Looks good, less secury.
As security is often a last resort thing in website developing and also maintaining websites.

Enjoy checking your websites, folks,

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

Checking a particular IP. Where we found it: https://urlquery.net/report/63564530-782e-4486-8c90-6b86f60b1514
Re: https://www.abuseipdb.com/whois/217.160.0.127
Re: https://dnslytics.com/ip/217.160.0.127
Re: https://checkphish.ai/ip/217.160.0.127
Re: https://www.maltiverse.com/ip/217.160.0.127https://www.reverse.it/sample/6dd77fce803eea862d81de51f28e214d71c8f23296f389e6d17ba7c41fccc58f?environmentId=100
Detections on relations here: https://www.virustotal.com/gui/ip-address/217.160.0.127/relations

enjoy,

polonus

Rather specific and fully random source: https://libraryofbabel.info/
A treat for full encryption lovers. See for instance: https://libraryofbabel.info/anglishize.cgi?

Info credits go to Sabroni at https://forums.theregister.co.uk/forum/all/2019/07/23/us_encryption_backdoor/

When nobody has full encryption only cybercriminals will have. Think of it, folks.
Do you want to hand over your general key(s), please :frowning:

polonus

Resource Blocked Servers: https://www.blockedservers.com/
because of http://gladesoft.com:8080/logs & https://urlhaus.abuse.ch/url/223109/ etc.
10 red out of 10 Netcraft risk: https://toolbar.netcraft.com/site_report?url=http%3A%2F%2F218.61.16.142
7 detected URLs: https://www.virustotal.com/gui/ip-address/218.61.16.142/details
Blocked because associated with a trojan: Updated by 54.70.118.129 (Amazon Boardman) 1 week, 6 days ago
tcpwrapped http Microsoft-IIS/6.0 (Chinese mainland mono-culture server).
On many block- and blacklists. Various online/offline threats: https://urlhaus.abuse.ch/host/218.61.16.142/

Another example: https://www.blockedservers.com/blocked/ipv4/51.77.95.123/ status clear
See: https://urlhaus.abuse.ch/url/223102/ conflicting results?

More resources, for Africa: https://threathaus.com/browse

For Mirai: https://mirai.security.gives/index.php?search=109.97.51.62
& http://sanyalnet-cloud-vps.freeddns.org/mirai-ips.txt
Poor Roque: https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/ciarmy.ipset

Also consider: https://nl.ipshu.com/whois_ipv4/115.193.112.213 (random example)
also found here: https://malwareworld.com/textlists/suspiciousIPs.txt
and here: https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/alienvault_reputation.ipset
and http://server3.pubres.cz/webalizer/webalizer.current
Compare: https://www.joesandbox.com/analysis/49409/0/html#domains
and https://www.abuseipdb.com/check/37.21.44.76
See: https://github.com/zabojcaspamu/spamassassin_rules/blob/master/local.cf.BL.ZABOJCASPAMU

Various resources: https://zeltser.com/malicious-ip-blocklists/

polonus

Address still launching malware:

2019-08-08 17:27:05 -http://patogh-7f.rozblog.c ... 79.127.127.68 IR JS/CoinMiner.AHpotentiallyunwantedapplication
Re: https://otx.alienvault.com/indicator/ip/79.127.127.68 & https://www.threatminer.org/host.php?q=79.127.127.68

polonus

Check on scams: http://www.scamfoo.com/site/pumafenty.com/
and
https://www.scamadviser.com/check-website/pumafenty.com

Further IP checkers: https://www.abuseipdb.com/whois/104.28.16.62
https://checkphish.ai/ip/104.28.16.62
-https://support.clean-mx.com/clean-mx/viruses.php?netname=CLOUDFLARENET&sort=id%20asc&response=alive (alerted by avast)
https://any.run/report/6e99730c1ce658125d7d181f9a6cc5aade8377ec1998d13af26515d99771ced8/1ff01ffc-7535-4100-af05-90d90ce933e8
https://www.malwareurl.com/listing.php?as=AS13335&active=off&view=all
https://www.hybrid-analysis.com/sample/14d82c8e39c2763c3b615f78b990e8ab058c55bf903ecda5f02cc1c98e19e991?environmentId=100

polonus

0

website checks and crypt check:
https://urlscan.io/result/49f31b2f-0b76-4977-973c-131aa0124576/
https://urlscan.io/domain/www.esri.com
https://securityheaders.com/?q=www.esri.com&followRedirects=on
https://observatory.mozilla.org/analyze/www.esri.com#third-party & https://observatory.mozilla.org/analyze/www.esri.com
https://tls.imirhil.fr/https/www.esri.com
https://webhint.io/scanner/d4503ab6-e6ba-4664-8cd8-c00794392d9f#category-Security
Retire.js
jquery 1.12.4 Found in -https://www.esri.com/etc/clientlibs/esri-sites/components.a85066077ee6f134710aeddea8215009.js
Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution

A parser-blocking, cross site (i.e. different eTLD+1) script, , is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See for more details. On Avast Secure Browser with Shift + Ctrl + I.
Why? Read here: https://developers.google.com/web/updates/2016/08/removing-document-write

polonus

More security header scans online:
https://www.immuniweb.com/websec/
https://tools.geekflare.com/secure-headers-test
https://hackertarget.com/http-header-check/
https://securityheaders.com/
https://httpsecurityreport.com/
Background read: https://csp.withgoogle.com/docs/index.html

enjoy, my friends, enjoy

polonus

Read: https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549
info credits go out to: Luan Herrera

Re: https://chromium.googlesource.com/infra/infra/+/master/appengine/monorail

Helpful here: https://unminify.com/ & https://www.generateit.net/javascript-decompressor/

polonus

Logging in with your facebook account, what privacy implications do you have to fear not blocking facebook?

The impact of a non-blocked visit:
https://privacyscore.org/site/143919/
& https://urlscan.io/result/5ea7f793-0c20-4fd9-8f1a-bb810babfab3

Or the consequenties for your digital privacy seen here:
https://urlscan.io/result/5ea7f793-0c20-4fd9-8f1a-bb810babfab3#links

Just interesting to skim through - JavaScript behaviour on that site:
https://urlscan.io/result/5ea7f793-0c20-4fd9-8f1a-bb810babfab3#behaviour
Did not know they used babel helper (generated per session).

Better than to speculate is to let the facts speak out for themselves. info credits: luntrus

polonus (volunteer 3rd part cold recon website security analyst and website error-helper)

The best way to avoid the privacy implications that are part of Facebook,
is to never open a Facebook account. Once opened, expect to kiss your privacy bye bye.

Guess why I have given social networking and the like a wide berth since they first appeared :wink:

Super Logout online: http://kapat.org/

Intel search engine, made by Peter Kleissner, the sinkhole expert.

Polonus was trained in automatic sinkholing expertise online by Peter Kleissner, n
ow head of Intelligence X
Re: https://intelx.io/?did=d4a06454-081c-45be-9ed2-9329499c5e89
and see how we reached that super logout tool…

polonus

Coming to USA Firefox now:
DoH: https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/
Advantages and disadvantages.
See Client Support: https://en.wikipedia.org/wiki/DNS_over_HTTPS

This all to battle against abuse of unencrypted DNS request connections.

Why this is not such a good idea for end-users:

  1. Concentrating all DoH requests with a small group of external players (like CloudFlare, Google) will mean an enhanced privacy risk for a large number of Internet-users, because mentioned players will exactly know for a great numer of Internet-users when and what websites they visit. Censorship and downgrading of certain websites is not unthinkable. From a privacy viewpoint it would be a goiod thing one could have many more DoH providers to choose from, but then blacklisting will be more of a problem, because;

  2. Local DNS-logging does no longer take place at firm-level. Of-course such logging means an enhanced risk, but it will enable you to detect compromitted devices within your network;

  3. DoH will raise demand for TLS-interception considerably and the risks therof outbalance overall profit.

(info credits: Erik van Straaten).

Using Pi-hole in such a setting makes you dependant on just one single DOH-provider. What about virtual hosts on one IP address.

But “DNS queries for the A and AAAA records for the domain “use-application-dns.net” must respond with NXDOMAIN rather than the IP address retrieved from the authoritative nameserver”.

Mozilla just thinks to comply with the following contract: In the US, Firefox by default directs DoH queries to DNS servers that are operated by CloudFlare, meaning that CloudFlare has the ability to see users’ queries. Mozilla has a strong Trusted Recursive Resolver (TRR) policy in place that forbids CloudFlare or any other DoH partner from collecting personal identifying information.
To mitigate this risk, our partners are contractually bound to adhere to this policy. (does not just only apply to Cloudflare’s)
Source: https://support.mozilla.org/en-US/kb/firefox-dns-over-https

Whenever you are used to non-existing Interwebz-privacy this is not a big thing, remember only that it only furthers the monopoly status of the big players, like we have Google, CloudFlare,

So again less to choose from, or use: Intra — an Android application by Jigsaw to route your DNS queries to a DNS-over-HTTPS server of your choice, re: https://play.google.com/store/apps/details?id=app.intra

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Several Public DOH servers tested against Mozilla Observatory Scan.

  1. https://observatory.mozilla.org/analyze/dns.adguard.com F-grade status
  2. https://observatory.mozilla.org/analyze/dns.google B- grade status
  3. https://observatory.mozilla.org/analyze/cloudflare-dns.com C- grade status
  4. https://observatory.mozilla.org/analyze/dns9.quad9.net no 200 OK returned, F-grade status
  5. https://observatory.mozilla.org/analyze/doh.cleanbrowsing.org B-grade status
  6. https://observatory.mozilla.org/analyze/doh.crypto.sx D- grade status
  7. https://doh-ch.blahdns.com/dns-query no 200 OK returned, F-grade status
  8. https://observatory.mozilla.org/analyze/dns.rubyfish.cn D+ grade status
  9. https://observatory.mozilla.org/analyze/doh.dnswarden.com no 200 OK returned D+ grade status
    10… EU server: https://observatory.mozilla.org/analyze/dns.aaflalo.me D+ grade status
  10. https://observatory.mozilla.org/analyze/doh.captnemo.in D- grade status
  11. https://observatory.mozilla.org/analyze/rdns.faelix.net no 200 OK returned, D- status
  12. https://observatory.mozilla.org/analyze/doh.armadillodns.net F-grade status
  13. https://observatory.mozilla.org/analyze/doh.netweaver.uk no 200 OK returned C- grade status
    15: https://observatory.mozilla.org/analyze/jp.tiar.app has an A+ status

Found at: https://github.com/curl/curl/wiki/DNS-over-HTTPS

From thiese results it seems that DNSSec Japan, is best, A+ status grade,
No Censorship, No Logging, No ECS, support DNSSEC in Japan,
Nihon iti! (source credits go to: luntrus)

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

On being fast: https://www.dnsperf.com/#!dns-resolvers
see: https://cloudflare-dns.com/

polonus

AMP

Why AMP is bad? Read: https://medium.com/@danbuben/why-amp-is-bad-for-your-site-and-for-the-web-e4d060a4ff31

Convert to AMP: https://www.ezoic.com/google-amp-converter/?{lpurl}?utm_source=google&utm_medium=g&utm_term=accelerated%20mobile%20pages&utm_content=228474895894&utm_campaign=755009171&utm_source=google&utm_medium=g&utm_term=accelerated%20mobile%20pages&utm_content=228474895894&utm_campaign=755009171&gclid=EAIaIQobChMI0Zfv49j15AIVTPlRCh2hQAdaEAAYASAAEgL32fD_BwE

Test AMP: https://search.google.com/test/amp

And see in the light of Google’s (non-)existing privacy policies: https://www.theregister.co.uk/2019/09/25/google_privacy_wc3/

What is shown often is not known, end-user transparency does not exist or barely,
end-users aren’t fully aware of the tracking and data-slurping that is going on all of the time all the time,
and it almost seems end-users rather not know.

A rather small percentage of “wokers” to these facts of digital life around. It is all about less user-control
on content (fake news), analytics & design, and more advanced Google control.

  1. (Most important) Use a VPN or Proxy server.

  2. Use an ad blocker.

  3. Disable 3rd party cookies.

  4. Disable JavaScript or use just what you need to make the webpage function for you (uMatrix)

  5. Use a good browser and not the Google Chrome (clone) spyware)).
    When using Google Chrome use it in incognito mode (and it does not track you that way). (info credits; Maelstorm)

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

L.S. Found my topic mentioned here: https://forum.avast.com/index.php?topic=129271.msg1513283#msg1513283
This is at ‘google results’ here: https://www.virustotal.com/gui/ip-address/217.160.0.127/details
This related to this scan result: https://www.virustotal.com/gui/url/6dd7baf5fafb4b7fab4f3f6d9e6f95b862409a697b4e651af8c0fb7adced5ae3/details
where now 7 engines detect.
Also mentioned at the above google results = https://urlquery.net/report/5c0b87e5-08cf-4f80-9b70-89af08ec9e68
coming from this scan report @ urlquery dot net: https://urlquery.net/report/63564530-782e-4486-8c90-6b86f60b1514
malware detected by fortinet’s this index.php uri

pol