Giter VIP home page Giter VIP logo

cloudbleed-browser-scan's Introduction

cloudbleed-browser-scan

This script is designed to make it easy to scan your browser history to search for sites potentially affected by CloudBleed.

Currently there is a massive list of CloudFlare-enabled domains, and some folks have created websites where users can enter, one-at-a-time, domains to check. While providing an easy-to-use interface, this suffers from the following problems:

  • It it tedious to check large numbers of domains
  • It requires that you share your browsing information with third-parties that you migh not trust

By contrast, cloudbleed-browser-scan allows those comfortable with a few command-line commands to privately search their web browser's history for domains that are potentially affected by CloudBleed in a matter of seconds. This allows you to see if there are any sensitive domains on the list, and thus you can just change your passwords and credentials on a hopefully shorter list.

Currently this script will run on Mac OS X, but porting to Linux should be easy. It currently supports the following browsers:

  • Firefox
  • Chrome
  • Chromium
  • Safari
  • Tor Browser

More on CloudBleed: https://en.wikipedia.org/wiki/Cloudbleed

This Git repo has the following essential Git repo as a submodule. It provides a curated list of potentially-affected sites: https://github.com/pirate/sites-using-cloudflare

Install & Use:

Note that this Git repo has the sites-using-cloudflare repo as a submodule, so do note the --recursive option to git clone:

git clone --recursive https://github.com/taltman/cloudbleed-browser-scan.git
cd cloudbleed-browser-scan
./cloudbleed-browser-scan

The script prints some helpful messages to STDERR while the script is running. You can redirect the list of affected domains from STDOUT. The output consists of the following fields:

  • URL
  • Number of times visited (summed across all browsers)
  • Date of last visit (most recent across all browsers)

The two additional metadata fields make it very easy to whittle down a large list. Here's an example session:

> time ./cloudbleed-browser-scan > scan.txt
Loading CloudFlare domain list...
Loaded 4287589 domains.
Found 359 CloudFlare-associated domains out of 66235 domains from your
browsers.

> awk -F'\t' '$2 > 10' scan.txt | wc -l
28

The above can read as saying that out of the 4,287,589 domains currently associated with CloudFlare, 359 were also found in my browsing history of 66,235 domains. Since the bug is reported as having been introduced in September 2016, the output is restricted by default to sites visisted afterwards. Furthermore, by eyeballing the scan.txt list, I noticed that sites that I had visited fewer than ten times were sites that did not contain any important information on them. Applying these restrictions, I was left with 28 sites to scrutinize manually. Of these, twelve are sensitive, and I will definitely change my passwords there.

Definitely a lot easier than entering in 66,235 domains into a Cloudbleed-checking website tool! :-)

Feedback

Please feel free to file issues, and to fork & send me pull requests. Thanks!

Acknowledgements

Thank you to the following people:

  • axelsimon for suggesting to remove the dependency on having a GitHub account

cloudbleed-browser-scan's People

Contributors

taltman avatar

Stargazers

 avatar  avatar  avatar

Watchers

 avatar

cloudbleed-browser-scan's Issues

Install info is incorrect

Hi, trying to install following the README.md's install method:

[axel@laptop:~/Software/tmp] $ git clone --recursive [email protected]:taltman/cloudbleed-browser-scan.git
Cloning into 'cloudbleed-browser-scan'...
Permission denied (publickey).
fatal: Could not read from remote repository.

Please make sure you have the correct access rightsand the repository exists.

cloning using the https address works fine (git clone https://github.com/taltman/cloudbleed-browser-scan), however the .gitmodules file uses url = [email protected]:pirate/sites-using-cloudflare.git which runs into the same problem.

As my git-fu is weak, I haven't yet worked out how to get git to recursively pull the sites-using-cloudflare using the https protocol (switching the url to url = https://github.com/pirate/sites-using-cloudflare is easy enough).

In any case, thanks for the tool ๐Ÿ˜ƒ

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.