Wednesday, December 25, 2024
Homecyber securityBehave - A New Browser Extension to Find websites that Perform Browser-Based...

Behave – A New Browser Extension to Find websites that Perform Browser-Based Port Scans or Attack

Published on

SIEM as a Service

A new browser extension published dubbed Behave! that warns the user if the website tries to perform a port scan or launch DNS based attacks.

The web sites port scanning issue came into light after a script found on the eBay website that performs local port scans on a user computer to check for remote access.

The port scanning conducted by LexisNexis’ ThreatMetrix fraud protection script that used to detect fraudulent purchases.

- Advertisement - SIEM as a Service

Following to that number of popular websites found using the fraud protection script scans local for remote access programs.

According to report here are some of the popular websites include Citibank, TD Bank, Ameriprise, Chick-fil-A, Lendup, BeachBody, Equifax IQ connect, TIAA-CREF, Sky, GumTree, and WePay port scanning our computers.

Behave! Browser Extension

The extension was created by Stefano Di Paola, co-founder, CTO, and Chief Scientist of MindedSecurity, the extension was created aiming to warn users if the website abuses browser features to scan or to launch any attacks.

Behave

The extension monitors and warns the user if they perform any of the following actions:

  • Browser-based Port Scan
  • Access to Private IPs
  • DNS Rebinding attacks to Private IPs

The extension alerts the user if port scanning is performed, the default limit is 20 if the browser session exceeds the limit, then browser extension warns the user.

Also, it alerts users if a web page tries to directly access a local IP and if DNS resolves to a private IP.

Behave

“Behave! keeps track if a hostname is resolved with multiple IPs, and will alert if there’s some mixing between public IPs and private ones.”

The extension is available to download for Firefox and Chrome browsers. You can also disable or enable alerts.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability...

USA Launched Cyber Attack on Chinese Technology Firms

The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access

A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary...

CISA Issues Secure Practices for Cloud Services To Strengthen U.S Federal Agencies

In a decisive move to bolster cloud security, the Cybersecurity and Infrastructure Security Agency...

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...