View Issue Details

IDProjectCategoryView StatusLast Update
0001930Kali LinuxNew Tool Requestspublic2014-12-02 12:16
Reporterecasbas Assigned Tomuts  
PrioritynormalSeverityfeatureReproducibilityN/A
Status closedResolutionno change required 
Summary0001930: New tool: desenmascara.me (web application / information gathering)
Description

Desenmascara.me is a public resource which will extract metadata from any website (either domain name or IP address, no resource) and will explain it in a brief summary. The extraction will be totally passive, just like browsing the website, otherwise the tool couldn't be online for public use.

It's based mainly on HTTP headers and metadata. Some features of the tool are:

-Easy to use, only enter a website address to see what's behind the scenes
-Available in English and Spanish (based on the browser language)
-Testing for web application fingerprinting
-Brief summary about the website configuration
-Different report colors to highlight web security awareness
-Some special websites will show a message showing whether they are official or fake (keep counterfeit products from circulation)
-Detection of CMSs and versions (whatweb core)
-Warnings about old software being exploited in the wild like joomla-1.5, RoR CVE-2013-0156...
-Detection of properties file leak in Ruby on Rails. Ref: Fugas de informacion en aplicaciones ruby on rails
-Warnings about OpenSSL version affected by heartbleed
-Detection of hardening signs such as WAF, CDN, reverse proxy...
-In case of CloudFlare protected websites, it will show the real server IP
-Detection of blacklisted websites by GoogleSafeBrowsing
-Detection of suspicious iframes or hidden spam
-Detection of misconfiguration on robots.txt files (i.e: exposing confidential information)
-Detection of defacements, directory listings, private IP address in comments...
-In the case of very known websites (Forbes, EA, .gov...) will inform about known security incidents which they were victim of
-Stats about general web security awareness and some details of compromised websites (i.e: Forbes compromised)

Steps To Reproduce

http://desenmascara.me

Additional Information

Example's report for: https://bugs.kali.org
http://desenmascara.me/consulta/af7ceb90dcd0e70f778f65b35c6beb11

Example's report for: http://www.nottinghamshire.police.uk/ (Recently compromised)
http://desenmascara.me/consulta/1805493f382eec3d564f86e9eb6b55d1

Some tool references:
https://www.stopbadware.org/hacked-sites-resources
https://www.blackhat.com/eu-14/arsenal.html#desenmascara-me

More info:
http://desenmascara.me/english

Activities

muts

muts

2014-12-02 11:41

reporter   ~0002842

Not a tool, but an online service.

ecasbas

ecasbas

2014-12-02 12:13

reporter   ~0002843

Sorry, yes, per muts's comment, the correct request would have to be: add the web service to bookmarks of the distro, instead of to add a new tool.

muts

muts

2014-12-02 12:16

reporter   ~0002844

No plans of doing so as of now. If we ever open up a "online tools" section in the booksmarks area, we will reconsider this request

Issue History

Date Modified Username Field Change
2014-11-25 09:24 ecasbas New Issue
2014-12-02 11:36 rhertzog Product Version kali-dev =>
2014-12-02 11:41 muts Note Added: 0002842
2014-12-02 11:41 muts Status new => closed
2014-12-02 11:41 muts Assigned To => muts
2014-12-02 11:41 muts Resolution open => no change required
2014-12-02 12:13 ecasbas Note Added: 0002843
2014-12-02 12:13 ecasbas Status closed => feedback
2014-12-02 12:13 ecasbas Resolution no change required => reopened
2014-12-02 12:16 muts Note Added: 0002844
2014-12-02 12:16 muts Status feedback => closed
2014-12-02 12:16 muts Resolution reopened => no change required