Author Topic: Elastic ComputeCloud at Amazon Web Services could be somewhat more secure!  (Read 1079 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34060
  • malware fighter
Looking into the connection for Bitdefender's TrafficLight extension, I'd came accross thisDMARC Cloud & PaaS Amazon Web Services EC2.

See: http://toolbar.netcraft.com/site_report?url=http%3A%2F%2Fec2-35-156-205-71.eu-central-1.compute.amazonaws.com%2F
See: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fportal.ultradns.com%2F
3 vulnerable jQuery libraries: http://retire.insecurity.today/#!/scan/02556424416e1698b5d8947ce2386b093091cd76edcca020ebd0c2cf291538fa
A meagre F-Status with recommended changes: https://observatory.mozilla.org/analyze.html?host=portal.ultradns.com
links to googleadservices and for that a low D-status here: https://sritest.io/#report/cf450f94-7527-4f60-8e20-d27d538e56b8
controversial ultradns.com & nameserver ultradns.net,
-ultradns.com
You have 1 error
Wrong certificate installed.
The domain name does not match the certificate common name or SAN.
Certficate is for NEUSTAR via Rapid SSL - neustar.biz tested cert.
ssl-cert: Subject: commonName=-nimbus.bitdefender.net/organizationName=Bitdefender SRL/stateOrProvinceName=Bucuresti/countryName=RO

What is the relation to this code within the code from: -https://oknavigoda.ru/js/extsrc.js
See: http://urlquery.net/report.php?id=1491410096458  &  http://www.domxssscanner.com/scan?url=http%3A%2F%2Fyahoo.com%2Fsetting.doc

Re: https://urlscan.io/result/4ee63f85-f100-4108-ad98-c9546dedc176#summary
and compare to: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fsldf20.fp.bf1.yahoo.com
Trendy Atomic CSS being used...see our example presented here: http://xahlee.info/js/atomic_css_intro.html

polonus (volunteer website security analyst and website error-hunter)
« Last Edit: April 05, 2017, 10:29:47 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!