Skip to content

Appendix A Test Sites

Thorin-Oakenpants edited this page Jan 26, 2021 · 22 revisions

Here is a list of various websites in which to test your browser. You should enable Javascript (JS) on these sites for the tests to present a worst-case scenario. In reality, you should control JS and XSS (cross site scripting) on sites with extensions such as NoScript, uMatrix, uBlock Origin, among others, to reduce the possibility of fingerprinting attacks.

🔸 Fingerprinting

These are good sources to grab information on your results in one hit, but do not read too much into their entropy figures as the data is tainted

🔸 Multiple Tests [single page]

🔸 Multiple Tests [multi-page]

🔸 Encryption / Ciphers / SSL/TLS / Certificates

  • JA3 - https://ja3er.com/
  • BadSSL - https://badssl.com/
  • DCSec - https://cc.dcsec.uni-hannover.de/
  • Qualys SSL Labs - https://www.ssllabs.com/ssltest/viewMyClient.html
  • Fortify - https://www.fortify.net/sslcheck.html
  • How's My SSL - https://www.howsmyssl.com/
  • GRC Fingerprint - https://www.grc.com/fingerprints.htm
    • EV [Extended Validation] / SSL Interception check [Do you see a bright green padlock?]

🔸 Mozilla's Safe Browsing, Tracking Protection GitHub

  • Attack - https://itisatrap.org/firefox/its-an-attack.html
  • Blocked - https://itisatrap.org/firefox/blocked.html
  • Malware - https://itisatrap.org/firefox/unwanted.html
  • Phishing - https://itisatrap.org/firefox/its-a-trap.html
  • Tracking - https://itisatrap.org/firefox/its-a-tracker.html

🔸 Other

1 This test is a PoC (proof of concept). You will need layout.css.visited_links_enabled set as true. You will also need a normal window (not a Private Browsing one). The PoC only covers a handful of sites. For best results:

Clone this wiki locally