How to check your website will live up to EU cookie regulations?
Disclaimer: The results presented might not be 100 % correct. This tool is meant to be used by site owners as a starting point for improvements, not as a rigorous analysis. https://www.cookiemetrix.com/ free analysis of just the homepage of the website,
for a full analysis create an account. (info credits go to Choi)
Watch that CMS that is nearing end of service time!
200.000 Magento-webshops without any patches next year for Magento version 1 - no more security updates to come.
So with that CMS urgent advice is to change to Magento 2 (but that upgrade is not an easy one, so start now).
If you want to avoid Magento webshops that did not perform the upgrade to version 2,
then one could find out the version (only when settings allow).
By putting /magento_version behind the domain address.
Example:
$ curl https://www.horecaxl.com/magento_version
Magento/2.1 (Community) or scan at shodan.io for instance.
Another method is to scan with the tool available from here: https://whatcms.org/
polonus (volunteer 3rd party cold recon security website analyst and website error-hunter)
And we wil find the malware analysis on the malware researcher’s resource site like maltiverse.
for craft2cart.com
created 5 months ago / modified 5 months ago
Bancolombia Personas phishing - Antiphishing.com.ar av-element detected
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
Want to test hard coded key XOR Cipher and the weakness grade resembling Ceasar or rather Vigenère,
test here: https://www.dcode.fr/xor-cipher with many a tool to test encryption.
DNS Prefetching is being used to resolve hosts faster and get a better load, however it could inside Google Chrome lead to averse effects. Making web pages load slower, not load at all, etc.
Combing with DOM-XSS scanning for sinks and sources combining wit retirablejQuery library issues,
we have fine resources here: https://github.com/s0md3v/AwesomeXSS
What also could bring a lot of insight on a particular website, is when you open it up inside the Developer’s Console,
this could be done through at the same time giving in Ctrl+Shift+I
For this website -https://www.grenson.com
we could analyze:
preload.js:64 [Deprecation] Element.createShadowRoot is deprecated and will be removed in M73, around March 2019. Please use Element.attachShadow instead. See https://www.chromestatus.com/features/4507242028072960 for more details.
init @ preload.js:64
content-tss.js:2 content-tss.js loaded: -https://www.grenson.com/us/'-alert()/
(unknown) hosted page injected
content-ads.js:2 content-ads.js loaded: -https://www.grenson.com/us/'-alert()/
content.js:21 Uncaught TypeError: Illegal invocation: Function must be called on an object of type StorageArea
at content.js:21
-www.google-analytics.com/analytics.js:1 Failed to load resource: net::ERR_BLOCKED_BY_CLIENT
-grens11111.pcapredict.com/js/sensor.js:1 Failed to load resource: net::ERR_BLOCKED_BY_CLIENT
(index):1 [DOM] Found 2 elements with non-unique id #email: (More info: -https://goo.gl/9p2vKq)
(index):1 [DOM] Found 2 elements with non-unique id #login-form: (More info: -https://goo.gl/9p2vKq) … …
(index):1 [DOM] Found 2 elements with non-unique id #pass: (More info: -https://goo.gl/9p2vKq)
(index):1 [DOM] Found 4 elements with non-unique id #search: (More info: -https://goo.gl/9p2vKq)
(index):1 [DOM] Found 3 elements with non-unique id #search_mini_form: (More info: https://goo.gl/9p2vKq) … … …
(index):1 [DOM] Found 2 elements with non-unique id #send2: (More info: -https://goo.gl/9p2vKq) … …
(index):1 Unchecked runtime.lastError: Could not establish connection. Receiving end does not exist.
preload.js:64 [Deprecation] Element.createShadowRoot is deprecated and will be removed in M73, around March 2019. Please use Element.attachShadow instead. See -https://www.chromestatus.com/features/4507242028072960 for more details.
init @ preload.js:64
preload.js:64 [Deprecation] Element.createShadowRoot is deprecated and will be removed in M73, around March 2019. Please use Element.attachShadow instead. See h-ttps://www.chromestatus.com/features/4507242028072960 for more details.
init @ preload.js:64
content-tss.js:2 content-tss.js loaded: -https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lft7xkUAAAAAJC3_IM8O68WPOJHvttOTN-1dj74&co=aHR0cHM6Ly93d3cuZ3JlbnNvbi5jb206NDQz&hl=en&type=image&v=PRkVene3wKrZUWATSylf69ja&theme=light&size=normal&cb=4wm1rlpfzp0h
(unknown) hosted page injected
content-ads.js:2 content-ads.js loaded: -https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lft7xkUAAAAAJC3_IM8O68WPOJHvttOTN-1dj74&co=aHR0cHM6Ly93d3cuZ3JlbnNvbi5jb206NDQz&hl=en&type=image&v=PRkVene3wKrZUWATSylf69ja&theme=light&size=normal&cb=4wm1rlpfzp0h
content.js:21 Uncaught TypeError: Illegal invocation: Function must be called on an object of type StorageArea
at content.js:21
fingercounting.js:188 Uncaught DOMException: Failed to read the 'sessionStorage' property from 'Window': Access is denied for this document.
at Counter.wrapMethod (chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:188:27)
at new Counter (chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:160:12)
at chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:250:19
at chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:255:3
(unknown) caught WebWorker
content-tss.js:2 content-tss.js loaded: about:blank
(unknown) hosted page injected
content-ads.js:2 content-ads.js loaded: about:blank
content-tss.js:2 content-tss.js loaded: about:blank
(unknown) hosted page injected
content-ads.js:2 content-ads.js loaded: about:blank
content-tss.js:2 content-tss.js loaded: -https://www.google.com/recaptcha/api2/bframe?hl=en&v=PRkVene3wKrZUWATSylf69ja&k=6Lft7xkUAAAAAJC3_IM8O68WPOJHvttOTN-1dj74&cb=amz0tege1pe4
VM29:5 hosted page injected
content-ads.js:2 content-ads.js loaded: -https://www.google.com/recaptcha/api2/bframe?hl=en&v=PRkVene3wKrZUWATSylf69ja&k=6Lft7xkUAAAAAJC3_IM8O68WPOJHvttOTN-1dj74&cb=amz0tege1pe4
content.js:21 Uncaught TypeError: Illegal invocation: Function must be called on an object of type StorageArea
at content.js:21
fingercounting.js:188 Uncaught DOMException: Failed to read the 'sessionStorage' property from 'Window': Access is denied for this document.
at Counter.wrapMethod (chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:188:27)
at new Counter (chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:160:12)
at chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:250:19
at chrome-extension://ommfjecdpepadiafbnidoiggfpbnkfbj/js/web_accessible/fingercounting.js:255:3
-> -https://www.grenson.com/ and -alert()/# returns a "You could go to previous page... etc.
Enjoy, good hunt
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
With Retire.JS as an extension in the browser and retire insecurity today online scanner and also SNYK evaluation (see webhint scanner)
one can establish retirable jQuery libraries, with DOM-XSS scanners possible sources (input that can be eventually controlled) en sources (methods towards such a goal that can be (ab)used.
errorscript-src
expand_more
error*
script-src should not allow ‘*’ as source
error’unsafe-inline’
‘unsafe-inline’ allows the execution of unsafe in-page scripts and event handlers.
help_outline’unsafe-eval’
‘unsafe-eval’ allows the execution of code injected into DOM APIs such as eval().
help_outlineobject-src
expand_more
help_outline’self’
Can you restrict object-src to ‘none’ only?
Legend
errorHigh severity finding
errorMedium severity finding
help_outlinePossible high severity finding
removeDirective/value is ignored in this version of CSP
help_outlinePossible medium severity finding
clearSyntax error
info_outlineInformation
checkAll good
Each site’s authentic security certificate fingerprint (shown above) was just now obtained by GRC’s servers from each target web
server. If your web browser sees a different fingerprint for the same certificate (carefully verify the Certificate Name is identical) that
forms strong evidence that something is intercepting your web browser’s secure connections and is creating fraudulent site certificates.
You will find trackers reported, for instance through DNS Query Sniffer tool,
then check here: https://whotracks.me/trackers/gstatic.html
Also compare this search tool with insecure tracking found with Tracker SSL extension.
I have this installed in the browser: CSP Evaluator extension.
See response headers in Web Developer extension for particular websites.
Also Evading CSP with DOM-based dangling markup
For security researchers and analysers/pentesters, this is the season just for some back-up reading on these subjects,
and to further protection againsts such weaknesses. Enjoy, my friends, enjoy,
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)