[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] [Tool/API] desenmascara.me - Fingerprinting and assessing the web security awareness of website
From:       Emilio Casbas <ecasbasj () yahoo ! es>
Date:       2015-04-15 7:24:21
Message-ID: 414932309.3698790.1429082661344.JavaMail.yahoo () mail ! yahoo ! com
[Download RAW message or body]


desenmascara.me (in English can be translated as: Unmask me) is an online \
PoC tool whose goal is: to raise web security awareness among web owners in \
order to help decrease the constant rise of compromised websites.

The desenmascara.me PoC calculate a score also known as 'security awareness \
value' of any website (neither resources nor crawling) based on all the \
metadata available. Basically the score is based on a simple calculation of \
the more weak metadata you show the worst and in the other way around. It \
is explained as follows:

-Score < 0: a website is considered as prone to be compromised. (because it \
is based on known and buggy software such as old Joomla, highly critical \
                Drupal or Typo3 versions...)
-Score between 0 and 20: a website is not considered as security aware \
                (their owners have room to improvement, they should take \
                care)
-Score between 20 and 59: a website is considered somehow as security \
aware. (their owners have done some tweaking to the site). Usually this is \
                the normal status.
-Scoring 60 or higher: a website is considered as security aware (their \
owners have done some hardening either on the platform or in the web \
architecture)


Additionally as desenmascara.me will collect all the metadata possible from \
any website it can serve at the same time to two audiences:

-Auditors/pentesters: as 1 click method to Fingerprint a web server.
-Web owners without security background: trying to explain in a brief \
summary the web security awareness status based on all the info collected.

The metadata extraction will be totally passive just like browsing the \
website, otherwise the tool could not be online for public use. Some \
additional features of the tool by leveraging all the info collected are:

-Easy to use, only enter a website address to see what's behind the scenes
-Available in English and Spanish (based on the browser language)
-Detection of domains potentially being used for phishing (kind of: \
                mail-google.com.ve, applesupport.com.mx..)
-Detection of sites being mirrored from anothers (usually founds in \
                Phishing, fake and scareware websites)
-Detection of CMSs and versions (whatweb core)
 -Brief summary about the website configuration
 -Different report colours to highlight web security awareness
-Detection of domain registrar for .com & .net TLD (some are more security \
                savvy than others)
-Detection and warnings about the danger of hosting third party providers.
-Warnings about old software being exploited in the wild like joomla-1.5, \
                RoR CVE-2013-0156...
-Warnings about domains (.com & .net) expiring in the coming days
-Detection of properties file leak in Ruby on Rails. 
-Warnings about OpenSSL version afected by heartbleed.
-Warnings about Drupal Core - Highly Critical PSA-2014-003.
-Warnings about TYPO3 - Highly Critical Authentication bypass.
-Detection of hardening signs such as WAF, CDN, reverse proxy...
-In case of CloudFlare protected websites, it will try to show the real \
                server IP.
-Detection of blacklisted websites by GoogleSafeBrowsing
-Detection of suspicious iframes or hidden spam
-Detection of misconfiguration on robots.txt files (i.e: exposing \
                confidential information)
-Detection of defacements, directory listings, private IP address in \
                comments...
-In the case of very known websites (Forbes, EA, .gov ...) will inform \
                about known security incidents which they were victim of.
-Stats about general web security awareness and some details of compromised \
websites

The goal of this tool is NOT to consider a website either secure or \
insecure, but to consider the website owners security aware in different \
levels as explained.

In my observations during the last years I could spot a common pattern \
among the vast majority of compromised websites being used in all kind of \
malware campaigns: they are all poor maintained.

With this PoC the goal is to highlight the importance to keep updates the \
websites. The lowest the score the more vulnerable a website is and \
therefore prone to be compromised. Bear in mind that this analysis is valid \
for most of the current attacks on the web nowadays; compromised websites \
to serve as redirectors, to store phishings, as proxys for exploit kits and \
any malicious purposes of malware campaigns. All the above activity within \
the compromised websites is taking place without their owner´s knowledge, \
in web servers which can be online during years without updates. All the \
malicious activity is happening behind the scenes. Later the owner of the \
website will get complains either from their users or the hosting company. \
The problem is that these owners are not security aware (nor the hosting \
companies). But if you have deployed a website you should take some \
precautions, you can not rely on the sofware vendors, community or the \
hostings. It is like driving a car, you need formation and a license and \
then you need to keep you car in good status, doing the yearly checks and \
so on, in order to not be a danger in the road. By not taking precautions \
you would be considered as an irresponsible and you will end up with fines \
at best. The same in Internet, if you do not take precautions with your \
website then you are feeding the malware ecosystem in the Internet.

Having done some tests [1] with the desenmascara.me scoring towards tens of \
websites from the same malware campaign. And by observing the results \
during the last years of using this scoring I can see the accuracy to \
evaluate the relation between poor maintained websites and how they become \
compromised is around 80%.

Therefore I have decided to publish an API [2] to this service with an \
interesting use intended for an initial fulldisclosure and as a wake up \
call for their web owners: querying URLs prone to be compromised: \
http://desenmascara.me/api/howto#pronetld

You can play with http requests such as:
http://desenmascara.me/api/lessscorebytld/gov
http://desenmascara.me/api/lessscorebytld/br
http://desenmascara.me/api/lessscorebytld/com

There is nothing illegal nor unethical on providing this information. All \
the info is public, the desenmascara.me service just collect it and \
interpret it.

http://desenmascara.me


REFERENCES

[1] http://pwnedwebsites.com/how-to-spot-website-easy-target.html[2] \
http://desenmascara.me/api/howto

Thanks
Emilio

 
 

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic