Skip to content

Appendix A Test Sites

claustromaniac edited this page May 21, 2019 · 11 revisions

Here is a list of various websites in which to test your browser. You should enable Javascript (JS) on these sites for the tests to present a worst-case scenario. In reality, you should control JS and XSS (cross site scripting) on sites with extensions such as NoScript, uMatrix, uBlock Origin, among others, to reduce the possibility of fingerprinting attacks.

If you would like to submit a test page to be added to this list, please post the details here for consideration, thanks.

:star: Shameless Self Promotion

  • TorZillaPrint - https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html
    • GitHub - https://github.com/ghacksuserjs/TorZillaPrint
    • A work-in-progress: for Firefox and Tor Browser (read the readme)
    • I got tired of testing things (and remembering where they all where) over numerous sites, and some tests were missing, so this is my solution
    • Any JS wizards wishing to help out would be highly welcomed :kiss:

:small_orange_diamond: Fingerprinting

These are good sources to grab information on your results in one hit, but do not read too much into their entropy figures - see this comment

:small_orange_diamond: Multiple Tests [single page]

  • Privacycheck - https://privacycheck.sec.lrz.de/index.html
  • Whoer - https://whoer.net/
  • Do I Leak? - https://www.doileak.com/
  • IP/DNS Leak - https://ipleak.net/
  • IP Duh - https://ipduh.com/anonymity-check/
  • Zscaler - http://securitypreview.zscaler.com/
    • Security overview from phishing & malware & botnet connections, XSS, various exe/virus delivery mechanisms etc

:small_orange_diamond: Multiple Tests [multi-page]

:small_orange_diamond: Encryption / Ciphers / SSL/TLS / Certificates

  • BadSSL - https://badssl.com/
  • DCSec - https://cc.dcsec.uni-hannover.de/
  • Qualys SSL Labs - https://www.ssllabs.com/ssltest/viewMyClient.html
  • Fortify - https://www.fortify.net/sslcheck.html
  • How's My SSL - https://www.howsmyssl.com/
  • GRC Fingerprint - https://www.grc.com/fingerprints.htm
    • EV [Extended Validation] / SSL Interception check [Do you see a bright green padlock?]

:small_orange_diamond: Mozilla's Safe Browsing, Tracking Protection GitHub

  • Attack - https://itisatrap.org/firefox/its-an-attack.html
  • Blocked - https://itisatrap.org/firefox/blocked.html
  • Malware - https://itisatrap.org/firefox/unwanted.html
  • Phishing - https://itisatrap.org/firefox/its-a-trap.html
  • Tracking - https://itisatrap.org/firefox/its-a-tracker.html

:small_orange_diamond: Other

1 This test is a PoC (proof of concept). You will need layout.css.visited_links_enabled set as true. You will also need a normal window (not a Private Browsing one). The PoC only covers a handful of sites, and many of those will not "leak" as the code is checking HTTP and the site has moved to HTTPS - i.e the full URL has changed. For best results:

You can’t perform that action at this time.