[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] [Tool/API] desenmascara.me - Fingerprinting and assessing the web security awareness of website
From:       Emilio Casbas <ecasbasj () yahoo ! es>
Date:       2015-04-15 7:24:21
Message-ID: 414932309.3698790.1429082661344.JavaMail.yahoo () mail ! yahoo ! com
[Download RAW message or body]


desenmascara.me (in English can be translated as: Unmask me) is an online PoC tool whose goal \
is: to raise web security awareness among web owners in order to help decrease the constant \
rise of compromised websites.

The desenmascara.me PoC calculate a score also known as 'security awareness value' of any \
website (neither resources nor crawling) based on all the metadata available. Basically the \
score is based on a simple calculation of the more weak metadata you show the worst and in the \
other way around. It is explained as follows:

-Score < 0: a website is considered as prone to be compromised. (because it is based on known \
                and buggy software such as old Joomla, highly critical Drupal or Typo3 \
                versions...)
-Score between 0 and 20: a website is not considered as security aware (their owners have room \
                to improvement, they should take care)
-Score between 20 and 59: a website is considered somehow as security aware. (their owners have \
                done some tweaking to the site). Usually this is the normal status.
-Scoring 60 or higher: a website is considered as security aware (their owners have done some \
hardening either on the platform or in the web architecture)


Additionally as desenmascara.me will collect all the metadata possible from any website it can \
serve at the same time to two audiences:

-Auditors/pentesters: as 1 click method to Fingerprint a web server.
-Web owners without security background: trying to explain in a brief summary the web security \
awareness status based on all the info collected.

The metadata extraction will be totally passive just like browsing the website, otherwise the \
tool could not be online for public use. Some additional features of the tool by leveraging all \
the info collected are:

-Easy to use, only enter a website address to see what's behind the scenes
-Available in English and Spanish (based on the browser language)
-Detection of domains potentially being used for phishing (kind of: mail-google.com.ve, \
                applesupport.com.mx..)
-Detection of sites being mirrored from anothers (usually founds in Phishing, fake and \
                scareware websites)
-Detection of CMSs and versions (whatweb core)
 -Brief summary about the website configuration
 -Different report colours to highlight web security awareness
-Detection of domain registrar for .com & .net TLD (some are more security savvy than others)
-Detection and warnings about the danger of hosting third party providers.
-Warnings about old software being exploited in the wild like joomla-1.5, RoR CVE-2013-0156...
-Warnings about domains (.com & .net) expiring in the coming days
-Detection of properties file leak in Ruby on Rails. 
-Warnings about OpenSSL version afected by heartbleed.
-Warnings about Drupal Core - Highly Critical PSA-2014-003.
-Warnings about TYPO3 - Highly Critical Authentication bypass.
-Detection of hardening signs such as WAF, CDN, reverse proxy...
-In case of CloudFlare protected websites, it will try to show the real server IP.
-Detection of blacklisted websites by GoogleSafeBrowsing
-Detection of suspicious iframes or hidden spam
-Detection of misconfiguration on robots.txt files (i.e: exposing confidential information)
-Detection of defacements, directory listings, private IP address in comments...
-In the case of very known websites (Forbes, EA, .gov ...) will inform about known security \
                incidents which they were victim of.
-Stats about general web security awareness and some details of compromised websites

The goal of this tool is NOT to consider a website either secure or insecure, but to consider \
the website owners security aware in different levels as explained.

In my observations during the last years I could spot a common pattern among the vast majority \
of compromised websites being used in all kind of malware campaigns: they are all poor \
maintained.

With this PoC the goal is to highlight the importance to keep updates the websites. The lowest \
the score the more vulnerable a website is and therefore prone to be compromised. Bear in mind \
that this analysis is valid for most of the current attacks on the web nowadays; compromised \
websites to serve as redirectors, to store phishings, as proxys for exploit kits and any \
malicious purposes of malware campaigns. All the above activity within the compromised websites \
is taking place without their owner´s knowledge, in web servers which can be online during \
years without updates. All the malicious activity is happening behind the scenes. Later the \
owner of the website will get complains either from their users or the hosting company. The \
problem is that these owners are not security aware (nor the hosting companies). But if you \
have deployed a website you should take some precautions, you can not rely on the sofware \
vendors, community or the hostings. It is like driving a car, you need formation and a license \
and then you need to keep you car in good status, doing the yearly checks and so on, in order \
to not be a danger in the road. By not taking precautions you would be considered as an \
irresponsible and you will end up with fines at best. The same in Internet, if you do not take \
precautions with your website then you are feeding the malware ecosystem in the Internet.

Having done some tests [1] with the desenmascara.me scoring towards tens of websites from the \
same malware campaign. And by observing the results during the last years of using this scoring \
I can see the accuracy to evaluate the relation between poor maintained websites and how they \
become compromised is around 80%.

Therefore I have decided to publish an API [2] to this service with an interesting use intended \
for an initial fulldisclosure and as a wake up call for their web owners: querying URLs prone \
to be compromised: http://desenmascara.me/api/howto#pronetld

You can play with http requests such as:
http://desenmascara.me/api/lessscorebytld/gov
http://desenmascara.me/api/lessscorebytld/br
http://desenmascara.me/api/lessscorebytld/com

There is nothing illegal nor unethical on providing this information. All the info is public, \
the desenmascara.me service just collect it and interpret it.

http://desenmascara.me


REFERENCES

[1] http://pwnedwebsites.com/how-to-spot-website-easy-target.html[2] \
http://desenmascara.me/api/howto

Thanks
Emilio

 
 

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic