Tests and other Media topics

Random example of such a CSP Evaluation:

CSP Evaluated for the Sucuri SiteChek website: High Security Findings 2.

errorscript-src [missing] script-src directive is missing. expand_more

errorobject-src [missing]
Missing object-src allows the injection of plugins which can execute JavaScript. Can you set it to ‘none’?
expand_more

Page meta security headers not set securely set for (missing) /
Upgrade insecure-requests CSP Header HTTP Security Header RECX Security Analyser.

I would expect an A grade result, not a B+ like: https://observatory.mozilla.org/analyze/sitecheck.sucuri.net

Content Security Policy -20 Content Security Policy (CSP) implemented unsafely.

This includes ‘unsafe-inline’ or data: inside script-src, overly broad sources such as https: inside object-src or script-src, or not restricting the sources for object-src or script-src.

Content Security Policy Analysis Test Pass Info Blocks execution of inline JavaScript by not allowing 'unsafe-inline' inside script-src x Blocks execution of JavaScript's eval() function by not allowing 'unsafe-eval' inside script-src V Blocks execution of plug-ins, using object-src restrictions X Blocks inline styles by not allowing 'unsafe-inline' inside style-src X Blocks loading of active content over HTTP or FTP V Blocks loading of passive content over HTTP or FTP V Clickjacking protection, using frame-ancestors X Deny by default, using default-src 'none' X Restricts use of the tag by using base-uri 'none', base-uri 'self', or specific origins X Restricts where contents may be submitted by using form-action 'none', form-action 'self', or specific URIs X Uses CSP3's 'strict-dynamic' directive to allow dynamic script loading (optional) -
V = green X = red

polonus

L.S.

Another evaluation of CSP on this website: → https://www.sitejabber.com/reviews/htbridge.com

frame-ancestors 'none'; * script-src [missing] script-src directive is missing. expand_more

errorobject-src [missing]
Missing object-src allows the injection of plugins which can execute JavaScript. Can you set it to ‘none’?


Also: https://observatory.mozilla.org/analyze/www.sitejabber.com#third-party
https://observatory.mozilla.org/analyze/www.sitejabber.com
and https://securityheaders.com/?followRedirects=on&hide=on&q=www.sitejabber.com
and https://report-uri.com/home/analyse/https%3A%2F%2Fwww.sitejabber.com%2F (* same results)

On header security: https://securityheaders.com/?q=https%3A%2F%2Fwww.sitejabber.com%2Freviews%2Fhtbridge.com&followRedirects=on

Also consider: https://webcookies.org/cookies/www.sitejabber.com/28801934?542749

On the hoster: Server: Apache/2.4.18

The header exposes web server version details. These server no purpose apart from making life of security auditors and hackers easier, leading them straight to exploits for this particular version of product.

No base-uri allows attackers to inject base tags which override the base URI to an attacker-controlled origin. Set to ‘none’ unless you need to handle tricky relative URLs scheme

Username Enumeration exploit(s) - view host details: https://www.shodan.io/host/52.4.241.179

look for SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.8 exploits

Note: 1. the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
2. Another threat with detected Google Tag Manager:
https://blog.sucuri.net/2018/04/malicious-activities-google-tag-manager.html

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

The State of JavaScript 2019
jQuery just has slightly over 11% of user-base left now: https://2019.stateofjs.com/
React and Angular.js the way to go?

Interesting: https://2019.stateofjs.com/testing/ & https://2019.stateofjs.com/other-tools/

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Various domain checks: https://www.zonemaster.net/domain_check
The following nameservers failed to resolve to an IP address : -ns-02.avast.com, -ns-06.avast.com.

35% only here: https://en.internet.nl/site/avast.com/735290/
Consider also: https://mxtoolbox.com/SuperTool.aspx?action=mx%3Asecurity.nl&run=toolpage#

8 problems found: https://mxtoolbox.com/domain/avast.com/

Just F-grade here: https://observatory.mozilla.org/analyze/avast.com (was an earlier -B grade).

A & C-scan results: https://observatory.mozilla.org/analyze/avast.com#third-party

Not vulnerable to TLS-Robot attack. (https://www.tbs-certificates.co.uk/FAQ/en/outils-scan-ssl-tls.html)

Not compliant: https://observatory.mozilla.org/analyze/avast.com#tls
See for improvement to modern times: https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility
Moderate: avast.com
New test
YOUR SCORE:
Unfortunately, the tested resource isn’t running on the latest TLS 1.3.

polonus

A nice collection of tools can be found here ->: https://report-uri.com/home/analyse
Among them an additional CSP Analyser.
Additional CSP inspection and validation ->: https://cspvalidator.org/#url=https://cspvalidator.org/

Checking the one with the other gives

Valid policy at → https://report-uri.com/home/analyseView
Raw Policy
Warning
1:462: The child-src directive is deprecated as of CSP level 3. Authors who wish to regulate nested browsing contexts and workers SHOULD use the frame-src and worker-src directives, respectively.

1:502: The upgrade-insecure-requests directive is an experimental directive that will be likely added to the CSP specification.

Info
1:529: A draft of the next version of CSP deprecates report-uri in favour of a new report-to directive.

So well worthy to bookmark this website address, when website developers have need of this addidtional inspection and validation :wink: (Remember always online nothing is a 100% full proof best policy, todays’ standards aren’t tomorrow’s).

Inside Avast Secure Browser I now use CSP Evaluator extension and CSP Tester extension next to JNote extension,
a JavaScript error notifier.

So we keep collecting various interesting tools for our toolboxes.

Check and test well into the coming new year 2020, my good friends, enjoy.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

For those that are about to have a Content Security Policy set out,

Inspecting and testing CSP for -https://sitecheck.sucuri.net

I found when validating CSP Strings it had “upgrade-insecure-requests”, an experimental directive
that will be likely added to the CSP specification.

Adding scrpt-src gave “directive is missing”
and for “object-src”, that when this is missing injections of plug-ins which can execute JS is possible.
So it is better to set it to ‘none’.

Just with the online and extension versions of CSP validation that was a lesson we have just learned to-day,
and we were also able to give feedback to the folks behind https://cspvalidator.org/#url=https://report-uri.com/home/analyse

polonus

In the light of what we read here about malicious manipulation of DNS:
https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html

Some online checking of DNS: https://toolbox.googleapps.com/apps/dig/?csrfmiddlewaretoken=k1EQjzk0oBDc5We7ZT4V4vwQ5IqtlIsI&domain=security.nl&typ=A#SRV/

Tests for modern standards: https://en.internet.nl/

Furthermore: https://dnschecker.org & https://mxtoolbox.com/DNSCheck-aspx

Checking DNS propagation: https://www.nexcess.net/web-tools/dns-checker/

polonus

Reference the DNS info above, I can recall, Firefox are introducing addition measures for secure DNS connections, a bit like https secure connections. I commented on how/if avast would deal with this additional protection level.

This was the post by Asyn:
https://forum.avast.com/index.php?topic=19387.msg1530670#msg1530670

And my comment:

Hi DavidR,

Some issues for DNS resolving will not be fixed as, like for instance PTR request for NIXDOMAINS.
Read: https://blogs.microsoft.com/on-the-issues/2019/12/30/microsoft-court-action-against-nation-state-cybercrime/

The overhaul or even partial overhaul of the DNS infrastructure will not materialize, I am afraid. Not even in a minimal sense.

And considering recent DoH being brought into firefox, there are grieve concerns from some it may just enhance Big Tech’s grip.

But I cannot see anything wrong with bringing in Google’s site verification, very important when sites are just starting to resolve.

Maybe we should enter into a way of encrypting DNS requests, there are some android apps that can do this.

polonus

An example where digging goes wrong.
DNS lookup fails with “254.242.55.65.in-addr.arpa” for instance.

DNSQuerySniffer, running under the browser, does not come up with a reply and cannot resolve.
You often experience that with PTR requests that involve MS.

So then looked here:

id 7223 opcode QUERY rcode NXDOMAIN flags QR RD RA ;QUESTION 254.242.55.65.in-addr.arpa. IN A ;ANSWER ;AUTHORITY 55.65.in-addr.arpa. 1799 IN SOA [b]ns1.msft.net. msnhst.microsoft.com.[/b] 2019121601 7200 900 7200000 3600 ;ADDITIONAL
this with toolbox google app's Dig DNS lookup.

Just like we expected NXDOMAIN, not registered domain or as a result of some server hick-up.

Many folks never really studied DNS and the ways to manipulate DNS.
A shame really, for it is an important issue,
playing out everywhere, also in the background (Cloud, Big Tech data retrieving).

Conclusion here “Parties fail to innovate and to overhaul and that even partly”,
or just call it like Americans do “sloppiness”, whatever.

Info credits go to luntrus,

Vizualize here: https://dnsviz.net/d/security.nl/dnssec/
also see: https://dnssec-debugger.verisignlabs.com/

polonus

Security grade of this search engine webpage: https://www.qwant.com/
Re: https://www.shodan.io/host/194.187.168.100
See: https://webhint.io/scanner/47f3776f-d541-49f3-93c0-a8d2dfb3c168
Cookie & Security Scan report: https://webcookies.org/cookies/www.qwant.com/1128157?673125
Re: B-grade: https://observatory.mozilla.org/analyze/www.qwant.com

Errors in browser console: Refused to load the image ‘hxtps://lite.qwant.com/img/v4/header/header-bg-tablet.svg?redirect=OperaMobi13.04&1539938515=’ because it violates the following Content Security Policy directive: “img-src blob: ‘self’ s1.qwant.com s2.qwant.com s.qwant.com data: s-boards.qwant.com s-lite.qwant.com www.qwant.com”.

/undefined:1 GET -https://www.qwant.com/undefined 404
Image (async)
replaceInnerHTML @ app.js?1576502819736:3
constructor @ app.js?1576502819736:3
startApplication @ bootstrap.js?1576502819736:196
(anonymous) @ bootstrap.js?1576502819736:140
b.then @ app.js?1576502819736:1
initApplication @ bootstrap.js?1576502819736:139
languageFileLoad @ bootstrap.js?1576502819736:254
load (async)
(anonymous) @ bootstrap.js?1576502819736:224

DOM-XSS issues: Results from scanning URL: -https://www.qwant.com/
Number of sources found: 2
Number of sinks found: 38

and results from scanning URL: -https://www.qwant.com/js/app.js?1576502819736
Number of sources found: 302
Number of sinks found: 1037

and results from scanning URL: -https://www.qwant.com/js/app.js?1576502819736
Number of sources found: 609
Number of sinks found: 291

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Domain name cert checks.

Combine tests here, for instance: https://www.immuniweb.com/radar/?id=v4BmqgTP
and https://www.immuniweb.com/ssl/ & https://www.immuniweb.com/websec/
also https://www.immuniweb.com/websec/?id=U3EpLj3f (example)
and at https://moz.com/learn/seo/domain

Check: crt.sh for certificate transparancy scans.

polonus

Next to testing with Retire.JS extension inside the browser or https://retire.insecurity.today/
developed by Erlend Oftedal, we can also test at DomStorm’s class selector XSS at
https://domstorm.skepticfx.com/modules?id=529bbe6e125fac0000000003
Other modules also available… handy for DOM-XSS searches for sinks and sources.
Other example test: https://domstorm.skepticfx.com/modules?id=559b066c34473500003d257b

Enjoy, my friends, enjoy,

polonus

To make the theoretical ideas stand out more practically - when we combine retire.JS -
domstorm repository, SNYK vulners etc., is to know how to protect against this,
especially against abuse combined with payload injectors. (XSSight abuse etc.).

In general: Defenses against XSS
What input do we trust? (browser- and client-side validation)
Does it adhere to expected patterns?
Never simply reflect untrusted data.
Applies to data within our database too.
Encoding of context(Java/attribute/HTML/CSS

polonus

Re: http://research.insecurelabs.org/jquery/test/

Let us take a particular example with known abuse and analyse retirable jQuery library there.
Re: https://www.abuseipdb.com/check/195.62.29.11 *
Check that particular IP for “vulners”: https://www.shodan.io/host/195.62.29.11 common OpenSSH abuse…
Site report: https://sitereport.netcraft.com/?url=http%3A%2F%2Fparagon.net.uk
We see an outdated Word Press CMS version there: WordPress Version 4.9.13
We see it has passed various reputation checks (questionable in the light of the abuse report, see above *)
Reputation Check
PASSED
Google Safe Browse:OK
Spamhaus Check:OK
Abuse CC:OK
Dshield Blocklist:OK
Cisco Talos Blacklist:OK

External hosts also Google Safe Browsing approved:
Externally Linked Host Hosting Provider Country
-www.godaddy.com GTT Communications Inc. United States
-www.heg.com Host Europe GmbH United Kingdom
-domains.meshdigital.com Host Europe GmbH United Kingdom
-www.domainbox.com Host Europe GmbH United Kingdom
-aboutus.godaddy.net Dosarrest Internet Security LTD United States

For the DOM we go here: https://urlscan.io/result/4c8d465b-1577-496b-9b0c-3c768c8c3dd0

1 Retirable jQuery library: https://retire.insecurity.today/#!/scan/608243a0f733be6600ab4c37808b81dd7dfbaccd646f3cbc5fc5251850d95bfc

DOM-XSS Sinks and Sources there: Results from scanning URL: -https://www.heg.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Number of sources found: 41
Number of sinks found: 17

Sources, output that could be controlled - .top! .innerHTML= [name= .location. .name write( opener| .parent .open( .op= =top+ “top”
sinks, methods to do so, .value href= data= .src=

The SNYK results from webhint - hint #1: ‘jQuery@1.12.4’ has 2 known vulnerabilities (2 medium). See ‘https://snyk.io/vuln/npm:jquery’ for more information@ https://webhint.io/scanner/9d38081f-16c8-4085-a918-baedbc3e3c9c#category-security

We find two requests with regular content on -https://www.heg.com/wp-includes/js/jquery/jquery.js?ver=1.12.4

Read: https://github.com/jquery/jquery/issues/2432

Also valuable info from: https://webcookies.org/cookies/www.heg.com/28887761?484748
about outdated PHP and excessive server info proliferation; X-Powered-By: PHP/5.4.44
The header exposes web server version details. These serves no purpose apart from making life of security auditors and hackers easier, leading them straight to exploits for this particular version of product - Server: Apache/2.2.15 (CentOS)
https://www.centos.org/forums/viewtopic.php?t=65285

Results of vulners webscanner extension for/on HEG website:

wXw.heg.com Apache, headers Not vulnerable [i]PHP, headers - 5.4.44 [i]vulnerable[/i] 7.5[/i] jQuery, headers - 1.3 Not vulnerable jQuery, script Not vulnerable jQuery Migrate, script Not vulnerable Bootstrap, script Not vulnerable Font Awesome, html Not vulnerable Yoast SEO, html - 4.5 Not vulnerable Wordpress - 4.9.13 Not vulnerable 2017 -Vulners.comvulners.com

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Compare malicious IP scans.

Re: https://urlhaus.abuse.ch/url/294136/
IP server info: https://www.shodan.io/host/108.58.8.186
together with Netcraft’s site report: https://sitereport.netcraft.com/?url=ool-6c3a08ba.static.optonline.net
Confirmation of scanning and Mirai-like infestations: https://viz.greynoise.io/ip/108.58.8.186

pol

Testing PHP - http://evuln.com/tools/php-security/
There are also free apllications, so I won’t give that address for we don’t wanna break those :wink:
Also: https://phpstan.org/ as an online tool.
Example test on index.php: https://phpstan.org/r/2976723a-53b1-4698-8984-ccbbdee9b292

https://www.quora.com/How-do-I-view-a-PHP-source-code-of-a-website-just-like-we-see-the-HTML-and-other-codes

Sucuri also has resources: https://wordpress.org/support/topic/sucuri-auditqueue-php-and-other-files/
Re: https://www.unphp.net/decode/788b15af31089576dfcc553a4eddedd0/

Vulners extension for this site -forum.avast.com gives vuln. PHP.headers 5.4.49 7.5
https://www.cvedetails.com/vulnerability-list/vendor_id-74/product_id-128/opbyp-1/PHP-PHP.html

Often PHP could mean a “can of worms”, specifically outside the kernel source of PHP based CMS like Word Press etc.

General interpretation of web security: https://infosec.mozilla.org/guidelines/web_security

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

L.S.

Linting for javascript errors and flaws, e.g. javascript-validation.
Combine with results from vulners webs scanner extension, Zen Mate Web Firewall extension &
Javascript Error Notifier extension and shodan extension for eventual website server info.

Using an online Javascript Validator: http://beautifytools.com/javascript-validator.php
Tested: -https://refugiodocapitao.com.br/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Number of sources found: 3
Number of sinks found: 0
Linting produced:
Line Col Errors
5 1 Missing semicolon.
0 0 Use the function form of “use strict”.
26 94 Missing semicolon.
31 146 Use ‘===’ to compare with ‘false’.

Scanned for retirable jQuery library: -https://refugiodocapitao.com.br/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Detected libraries:
jquery-migrate - 1.4.1 : -https://refugiodocapitao.com.br/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
No vulnerable libraries found

Line Col Errors
222 58 Unnecessary semicolon.
258 18 ‘options’ is defined but never used.
298 22 ‘e’ is defined but never used.
308 28 ‘e’ is defined but never used.
360 35 ‘options’ is defined but never used.
399 1 ‘new_max’ is defined but never used.
424 53 ‘options’ is defined but never used.
475 1 ‘whCustom’ is defined but never used.
530 22 ‘index’ is defined but never used.
460 1 ‘html_el’ is defined but never used.
464 1 ‘full_slider’ is defined but never used.
651 8 Use ‘===’ to compare with ‘0’.
695 27 ‘direction’ is defined but never used.
751 58 Expected an assignment or function call and instead saw an expression.
760 9 [‘jswing’] is better written in dot notation.
760 30 [‘swing’] is better written in dot notation.
794 62 A leading decimal point can be confused with a dot: ‘.3’.
801 62 A leading decimal point can be confused with a dot: ‘.3’.
808 65 A leading decimal point can be confused with a dot: ‘.3’.
811 22 A leading decimal point can be confused with a dot: ‘.5’.
812 71 A leading decimal point can be confused with a dot: ‘.5’.
834 41 A leading decimal point can be confused with a dot: ‘.75’.
836 44 A leading decimal point can be confused with a dot: ‘.9375’.
838 47 A leading decimal point can be confused with a dot: ‘.984375’.
842 70 A leading decimal point can be confused with a dot: ‘.5’.
843 60 A leading decimal point can be confused with a dot: ‘.5’.
843 67 A leading decimal point can be confused with a dot: ‘.5’.
781 49 Use ‘===’ to compare with ‘0’.
784 6 Use ‘===’ to compare with ‘0’.
794 6 Use ‘===’ to compare with ‘0’.
795 33 ‘s’ is already defined.
796 10 ‘s’ is already defined.
801 6 Use ‘===’ to compare with ‘0’.
802 33 ‘s’ is already defined.
803 10 ‘s’ is already defined.
808 6 Use ‘===’ to compare with ‘0’.
809 33 ‘s’ is already defined.
810 10 ‘s’ is already defined.
815 7 Use ‘===’ to compare with ‘undefined’.
819 7 Use ‘===’ to compare with ‘undefined’.
823 7 Use ‘===’ to compare with ‘undefined’.
906 50 ‘delay’ is defined but never used.
1173 17 Use ‘===’ to compare with ‘true’.
1289 5 ‘win’ is defined but never used.
1186 22 ‘avia_is_mobile’ is not defined.

Then we gonna compare to detected sinks and sources via a DOM XSS scan:

But here we found sources and sinks in retirable code:
https://retire.insecurity.today/#!/scan/618f3f67a7d9c4e74e7f1378ebe74d92b11d17db042b56d657463ceec95256d0

Detected sources and sinks: .parent, .top, .location, & location.href. =

Re: https://domstorm.skepticfx.com/https://domstorm.skepticfx.com/modules?id=56b4dfde108b7c00007363ac
Pentest tool like: https://github.com/lwzSoviet/NoXss

jQuery versions with known weaknesses
Bug 9521 - $(“#”)
Bug 11290 - $(“element[attribute=‘’”)
jQuery issue 2432 - 3rd party $.get() auto executes if content type is text/javascript
jQuery issue 11974 - parseHTML executes inline scripts like event handlers

enjoy, my good friends, enjoy.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Firefox is gonna block websites with T.L.S. 1.0 & 1.1. coming March.
Re: https://hacks.mozilla.org/2020/02/its-the-boot-for-tls-1-0-and-tls-1-1/

Check TLS here: https://www.cdn77.com/tls-test
or here: http://ssl-checker.online-domain-tools.com/
and here: https://www.checktls.com/

Also consider: https://geekflare.com/ssl-test-certificate or https://mxtoolbox.com/problem/smtp/smtp-tls
https://www.checktls.com/TestReceiver?LEVEL=DETAIL&EMAIL= (=domain name of mail server).

polonus

Interesting test here: https://hidester.com/webrtc-ip-leak-test/
and more at that site where that came from.
Redirect checker and many other tools here: http://www.internetofficer.com/seo-tool/redirect-check/

Check websites for trackers (check Ghostery & ZenMate Web Firwall extension) here:
(random example): https://whotracks.me/websites/rijmwoordenboek.nl.html

URL analysis: www.theurlanalyzer.com & against threats: https://csi.forcepoint.com/ (5 reports a day free access)

polonus