<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IP reputation &#8211; @Forensicxs</title>
	<atom:link href="https://www.forensicxs.com/tag/ip-reputation/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.forensicxs.com</link>
	<description>Ethical Hacking &#124; Cybersecurity</description>
	<lastBuildDate>Mon, 28 Jun 2021 10:04:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Cyber Security Rating in depth</title>
		<link>https://www.forensicxs.com/cyber-security-rating-in-depth/</link>
					<comments>https://www.forensicxs.com/cyber-security-rating-in-depth/#comments</comments>
		
		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Sat, 18 Jan 2020 19:49:42 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Bitsight]]></category>
		<category><![CDATA[Cybersecurity rating]]></category>
		<category><![CDATA[Cyrating]]></category>
		<category><![CDATA[DNSSEC]]></category>
		<category><![CDATA[https://www.nslookup.io/]]></category>
		<category><![CDATA[IP reputation]]></category>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=209</guid>

					<description><![CDATA[Here&#8217;s a trend setting prediction from Gartner that &#8220;says it all&#8221;&#8230; I&#8217;ll focus in this article about what is a cyber security rating, how it is made, and what is the business model of cyber-rating agencies. I will also test by myself one sample, using similar techniques to the ones used by cyber agencies, to &#8230; <p class="link-more"><a href="https://www.forensicxs.com/cyber-security-rating-in-depth/" class="more-link">Continue reading<span class="screen-reader-text"> "Cyber Security Rating in depth"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>Here&#8217;s a trend setting prediction from Gartner that &#8220;says it all&#8221;&#8230;</p>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-1024x260.png" alt="" class="wp-image-214" width="688" height="174" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-1024x260.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-300x76.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-768x195.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-830x211.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-230x58.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-350x89.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-480x122.png 480w, https://www.forensicxs.com/wp-content/uploads/2020/01/a.png 1062w" sizes="(max-width: 688px) 100vw, 688px" /></figure>



<p>I&#8217;ll focus in this article about what is a cyber security rating, how it is made, and what is the business model of cyber-rating agencies. I will also test by myself one sample, using similar techniques to the ones used by cyber agencies, to put it to the test</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Cyber security rating</span></strong> is an index, a score (such as points, a letter,&#8230;), similar in nature to the financial rating or other available ratings in the markets (consumer credit,&#8230;). Here&#8217;s how Bitsight, the US cyber security rating leader, positions himself in comparison to others </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/b-1024x479.png" alt="" class="wp-image-216" width="677" height="316" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/b-1024x479.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/01/b-300x140.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/b-768x359.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/b-830x389.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/b-230x108.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/b-350x164.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/b-480x225.png 480w, https://www.forensicxs.com/wp-content/uploads/2020/01/b.png 1081w" sizes="(max-width: 677px) 100vw, 677px" /></figure>



<p>To build the score, the agencies are collecting a bunch of data for each companies they intend to score. The datas are publicly available, and the analysis is not intrusive, but require a degree of automation to be efficient and reliable</p>



<p>As a starting point, the agency is taking the company name, it&#8217;s brand name and the corresponding domain names, public IP adresses, web sites, to search for the data. The point is to identify suspicious activities, traces of compromissions, basic configuration problems. Typically, the agency is going to look for two sources of informations : &#8220;fact&#8221; based, and &#8220;event&#8221; based</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-1.png" alt="" class="wp-image-220" width="530" height="249" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-1.png 763w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-1-300x141.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-1-230x108.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-1-350x165.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-1-480x226.png 480w" sizes="(max-width: 530px) 100vw, 530px" /></figure>



<p>Facts, or <em>factual data</em>, will be taken from direct queries of the domain, while events, or <em>online reputation</em>, will be derived from threat intelligence sources, data leaks, darknets, hacking forums,&#8230;. <strong><span class="has-inline-color has-luminous-vivid-orange-color">Bitsight</span></strong> provides the following summary of parameters used for the rating</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-2.png" alt="" class="wp-image-223" width="527" height="479" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-2.png 732w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-2-300x273.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-2-230x209.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-2-350x318.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-2-480x436.png 480w" sizes="(max-width: 527px) 100vw, 527px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Productive Corporation</span></strong>, another US agency, provides a more detailed view </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-3.png" alt="" class="wp-image-224" width="629" height="468" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-3-300x224.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-3-768x573.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-3-230x172.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-3-350x261.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-3-480x358.png 480w" sizes="(max-width: 629px) 100vw, 629px" /></figure>



<p>However, no rating agency is releasing it&#8217;s sources of informations, and core algorithm to calculate and generate the rating. Nevertheless, since the sources are said to be public, I&#8217;ll provide below potential actual sources used by rating agencies</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">SSL encryption</span></strong> : <a href="https://www.ssllabs.com/ssltest/">https://www.ssllabs.com/ssltest/</a> </p>



<p>This is a well known site from Qualys,  performing a deep analysis of the configuration of any SSL web server </p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Website exposure and security</span></strong> : <a href="https://www.immuniweb.com/websec/">https://www.immuniweb.com/websec/</a>, <a href="https://pentest-tools.com/website-vulnerability-scanning/website-scanner">https://pentest-tools.com/website-vulnerability-scanning/website-scanner</a></p>



<p>You will get subdomain discovery, GDPR/PCI DSS configuration, HTTP headers/cookies/third-party security analysis, infrastructure, and more</p>



<p>You can check the <strong><span class="has-inline-color has-luminous-vivid-orange-color">DNS records</span></strong> using this tool <a href="https://www.nslookup.io/" target="_blank" rel="noreferrer noopener">https://www.nslookup.io/</a> to find the SOA (Start Of Authority), the MX (email server) and more. Thanks @Ruurtjan for developing this tool</p>



<p>Note : if you would like to understand the limitations of such tools, I&#8217;ve found a good blog post about Web application finger printing and limitations at <a href="https://anantshri.info/articles/web_app_finger_printing.html#case_whatweb">https://anantshri.info/articles/web_app_finger_printing.html#case_whatweb</a></p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Site Reputation</span></strong> : <a href="https://talosintelligence.com/reputation_center">https://talosintelligence.com/reputation_center</a></p>



<p>Talos’ IP and Domain Data Center is one of the world’s most  comprehensive real-time threat detection network. It will pop up an alert in case a domain, an IP, is known to be a threat, whatever it&#8217;s form (DDOS, spam,&#8230;)</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">E-mail reputation</span></strong> : <a href="https://senderscore.org/">https://senderscore.org/</a></p>



<p>From a given IP or domain used to send email, you well get an overall assessment of email reliability (spam, blacklist,&#8230;)</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">DNSSEC, SPF</span></strong> : <a href="https://gf.dev/dnssec-test">https://gf.dev/dnssec-test</a></p>



<p>With this tool, you can check the basic configuration of Domain Name System Security Extensions, and Sender Policy Framework </p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">DMARC</span></strong> : <a href="https://mxtoolbox.com/dmarc.aspx">https://mxtoolbox.com/dmarc.aspx</a></p>



<p>The DMARC Record Lookup / DMARC Check is a diagnostic tool that will  parse the DMARC Record for the queried domain name, display the DMARC  Record, and run a series of diagnostic checks against the record.  Domain-based Message Authentication, Reporting, and Conformance (DMARC)  is a mechanism for policy distribution by which an organization that is  the originator of an email can communicate domain-level policies and  preferences for message validation, disposition, and reporting. </p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Pwn</span></strong> : <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a></p>



<p>This is the famous site from Troy Hunt, a security blogger. You can check if the evaluated company E-mail has been pwned</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Data leak</span></strong> : <a href="https://cracked.to/Forum-Databases">https://cracked.to/Forum-Databases</a></p>



<p>From these cracking and hacking forums, you may be able to find some leaked and hacked data. There are many sources like this on the Dark Web (I will write an article about this one day&#8230;)</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Reporting</span></strong></p>



<p>Most rating agencies have been able to develop a user friendly, business intelligence style, reporting system. Once can easily display charts of historical data such as this</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-6.png" alt="" class="wp-image-254" width="640" height="268" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-6.png 831w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-6-300x126.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-6-768x323.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-6-230x97.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-6-350x147.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-6-480x202.png 480w" sizes="(max-width: 640px) 100vw, 640px" /></figure>



<p>Also, one can access to the detailed risk vectors, observables, together with recommended mitigation actions</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-7.png" alt="" class="wp-image-255" width="717" height="335" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-7.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-7-300x140.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-7-768x359.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-7-830x388.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-7-230x108.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-7-350x164.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-7-480x225.png 480w" sizes="(max-width: 717px) 100vw, 717px" /></figure>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-8.png" alt="" class="wp-image-256" width="729" height="306" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-8.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-8-300x126.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-8-768x323.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-8-830x350.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-8-230x97.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-8-350x147.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-8-480x202.png 480w" sizes="(max-width: 729px) 100vw, 729px" /></figure>



<p>Last but not least, you can get a summary of the overall security posture, by area</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-9.png" alt="" class="wp-image-258" width="627" height="328" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-9.png 581w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-9-300x157.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-9-230x120.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-9-350x183.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-9-480x251.png 480w" sizes="(max-width: 627px) 100vw, 627px" /></figure>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">API</span></strong></p>



<p>It&#8217;s critical for the rating agency, to ensure an efficient access to datas, to integrate in its platform, the relevant API. Here is an example of an API documentation of an SSL scanning tool from Immuniweb, necessary to import the live data <a href="https://www.immuniweb.com/ssl/API_documentation.pdf">https://www.immuniweb.com/ssl/API_documentation.pdf</a></p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Is a cyber rating relevant to evaluate the cybersecurity of a company ?</span></strong></p>



<p>Although there are many critics as the rating looks superfical, just scratching the external surface of a company cyberdefense, I consider it is highly relevant, as a good rating will take into account the speed with which a company is updating it&#8217;s key technical assets, has little to none signs of compromissions, and has a solid configuration policy of it&#8217;s exposed assets. This would denote and correlate with good internal policies regarding cybersecurity. Other way round, a loose policy will be immediately visible to the external world with much probably low scores on each rated items</p>



<p>We have seen in the past years, that data leaks, compromissions, are often due to third parties, who have little cyber security awareness, leading big companies to suffer a major security breach. Therefore it will be even more critical to assess your suppliers, your partners, your IT vendors and so on. Panorays sums it up&#8230;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-10.png" alt="" class="wp-image-262" width="436" height="65" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-10.png 631w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-10-300x45.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-10-230x34.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-10-350x52.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-10-480x72.png 480w" sizes="(max-width: 436px) 100vw, 436px" /></figure>



<p>What’s remarkable is how many organizations don’t make an effort to view their public online assets as the rest of the world sees them — until it’s too late&#8230;</p>



<p>However, a rating is not sufficient to thoroughly assess the cybersecurity position of a given company. It would require security scans, pentest, organization audit, and more</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Who are the main actors ?</span></strong></p>



<p>US based agencies are the biggest in size and the more mature actors</p>



<ul class="wp-block-list"><li>Bitsight (USA), which is the leader, having managed to attract investors and raise capital over the years</li><li>UpGuard (USA)</li><li>Productive Corporation &#8211; Security ScoreCard (USA) &#8211; The rating agency Moody&#8217;s has invested here</li><li>Panorays (Israël) &#8211; startup</li><li>Cyrating (France) &#8211; startup</li><li>Provadys (France)</li></ul>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Business model considerations</span></strong></p>



<p>By nature, cyber rating agencies main goal is to make money from selling ratings to Companies. They are going to seek a lean internal process, to rate as many companies as possible. Therefore a key success factor is to have an automatized and accurate rating process, simple and quick, without impact on the rated companies</p>



<p>Since the rating is based on facts but also on events, it is critical for the rating agency to have access to good and comprehensive sources of informations, such as historical data regarding security incidents and Threat Intelligence. Therefore, US based companies certainly have a competitive edge as bank of datas are more widely available (CERT-US, ITRC,&#8230;) on such a big and cyber regulated country as the USA, while there are much more leading Threat Intelligence companies here</p>



<p>Bitsight has its own Threat Intelligence subsidiary which collects lots of data to support the rating process (see below)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-4.png" alt="" class="wp-image-247" width="657" height="318" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-4.png 767w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-4-300x145.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-4-230x111.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-4-350x169.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-4-480x232.png 480w" sizes="(max-width: 657px) 100vw, 657px" /></figure>



<p>As we can see, the key success factor, again, is to be able to exploit in a smart way, a lot of data scatered all over the place, thanks to a lot of connectors, API, big data technology</p>



<p>Another key success factor is the ability to create its own &#8220;market place&#8221; of company ratings, and attract companies to subscribe to the service. Even with a very efficient rating process, the rating agency will be nothing if they can&#8217;t attract many companies to subscribe to their &#8220;market place&#8221; and be part of the same community, where each one can compare and benchmark it&#8217;s rating to the others. A critical mass is therefore necessary with a wide portfolio of rated companies, and the rating agency had better reach it very quickly, otherwise failure is to be expected</p>



<p>Several rating agencies are proposing, beyond the basic rating, additional services for a premium (on premise assessment by an expert, on site audit,&#8230;), to make the rating more accurate and actionable and be able to sell more service and increase customer retention</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Pricing</span></strong></p>



<p>Rating agencies have pricing models whereby the price of a single rating will typically be in the thousands dollars, while you would spend a few hundred dollars per rating to buy thousands. It looks pretty expensive&#8230;but rating agencies advocate that this is going to be a fraction of the cost of a cyber audit</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Correlation to data breaches</span></strong></p>



<p>Bitsight claims there is a proven correlation between cyber ratings and data breaches. They provide a range matrix as follows</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-5.png" alt="" class="wp-image-252" width="595" height="270" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-5.png 655w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-5-300x136.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-5-230x104.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-5-350x159.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-5-480x218.png 480w" sizes="(max-width: 595px) 100vw, 595px" /></figure>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">The CEO point of view</span></strong></p>



<p>Unless you are very literate in cybersecurity, it is most of the time very hard to understand for a novice. Cyber rating provides the ability to translate complex cybersecurity issues into simple business context, allowing to simplify the approach for Management teams, economical actors, therefore providing decision makers a good way to anticipate risks and make decisions</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Cyber rating and sovereignty</span></strong></p>



<p>That&#8217;s a key issue as the growth of these agencies, mainly US based, gathering millions of data for their ratings, will allow them to handle a lot of sensitive informations regarding non US companies. Beyond external and public data, companies will be probably encouraged to provide more internal datas to support a good rating, thereby exposing them. Cyber rating could therefore be another tool to a US commercial domination</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Let&#8217;s practice !</span></strong></p>



<p>I&#8217;m not going to build a rating as it would be a complex endeavour, but I&#8217;m going to gather as much public data about a given domain, an evaluate how it&#8217;s cybersecurity posture look like, thus taking the first steps to a rating</p>



<p>I&#8217;ve chosen the domain <a rel="noreferrer noopener" aria-label="https://cryptoev (opens in a new tab)" href="https://cryptoevo.de/" target="_blank">https://cryptoev</a><a href="https://cryptoevo.de/">o.de/</a>, a German based cryptocurrency community. I would expect such a domain to be exemplary, as cryptocurrencies are supposed to back secure financial transactions&#8230;(although there has been many security flaws in cryptoasset marketplaces in the recent years). Here is a Whois snapshot</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-21.png" alt="" class="wp-image-278" width="687" height="117" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-21.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-21-300x51.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-21-768x131.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-21-830x141.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-21-230x39.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-21-350x60.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-21-480x82.png 480w" sizes="(max-width: 687px) 100vw, 687px" /></figure>



<p>In terms of technology, this website runs the following server, programs, API and frameworks</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-13.png" alt="" class="wp-image-267" width="696" height="316" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-13.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-13-300x137.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-13-768x349.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-13-830x378.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-13-230x105.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-13-350x159.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-13-480x218.png 480w" sizes="(max-width: 696px) 100vw, 696px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">SSL Labs / TLS configuration</span></strong> ( <a href="https://www.ssllabs.com/ssltest/">https://www.ssllabs.com/sslt</a> )</p>



<p>The domain gets the highest rating &#8220;A&#8221;. Notice that the website still supports TLS1.0 &#8211; for maximum compatibility -, which is going to be deprecated this January 2020</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-11.png" alt="" class="wp-image-265" width="565" height="293" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-11.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-11-300x156.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-11-768x399.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-11-830x431.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-11-230x120.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-11-350x182.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-11-480x249.png 480w" sizes="(max-width: 565px) 100vw, 565px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Website exposure and security</span></strong></p>



<p>Here is the rating out of  <a href="https://www.immuniweb.com/websec/">https://www.immuniweb.com</a> </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-12.png" alt="" class="wp-image-266" width="583" height="248" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-12.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-12-300x128.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-12-768x328.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-12-830x354.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-12-230x98.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-12-350x149.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-12-480x205.png 480w" sizes="(max-width: 583px) 100vw, 583px" /></figure>



<p>and this is the one from  <a href="https://pentest-tools.com/website-vulnerability-scanning/website-scanner">https://pentest-tools.com/website-vulnerability-scanning/website-scanner</a> </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-14.png" alt="" class="wp-image-268" width="690" height="121" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-14.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-14-300x53.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-14-768x135.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-14-830x146.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-14-230x40.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-14-350x61.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-14-480x84.png 480w" sizes="(max-width: 690px) 100vw, 690px" /></figure>



<p>There are a number of additional configurations available to increase the rating to the maximum possible</p>



<p><em>Missing HttpOnly flag on cookies</em> : when a cookie doesn’t have an HttpOnly flag, it can be accessed through  JavaScript, which means that an XSS could lead to cookies being stolen.  These cookies include, but are not limited to, CSRF tokens and client  sessions that can make it easier to achieve account/session takeover. A configuration line on the server can help solve this (see more details here <a href="https://support.detectify.com/customer/portal/articles/1969826-missing-httponly-flag-on-cookies">https://support.detectify.com/customer/portal/articles/1969826-missing-httponly-flag-on-cookies</a>)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-15.png" alt="" class="wp-image-269" width="732" height="100" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-15.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-15-300x41.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-15-768x106.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-15-830x114.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-15-230x32.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-15-350x48.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-15-480x66.png 480w" sizes="(max-width: 732px) 100vw, 732px" /></figure>



<p> The HTTP<em> X -XSS-Protection</em> response header  is a feature of Internet Explorer, Chrome and Safari that stops pages  from loading when they detect reflected cross-site scripting (<a href="https://developer.mozilla.org/en-US/docs/Glossary/XSS">XSS</a>) attacks. Although these protections are largely unnecessary in modern browsers when sites implement a strong Content Security Policy that disables the use of inline JavaScript (<code>'unsafe-inline'</code>), they can still provide protections for users of older web browsers that don&#8217;t yet support Content Security Policy</p>



<p><em>Strict Transport Security</em> not enforced :  the application fails to prevent users from connecting  to it over unencrypted connections.  An attacker able to modify a legitimate user&#8217;s  network traffic could bypass the application&#8217;s use of SSL/TLS  encryption, and use the application as a platform for attacks against  its users. This attack is performed by rewriting HTTPS links as HTTP, so  that if a targeted user follows a link to the site from an HTTP page,  their browser never attempts to use an encrypted connection </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-16.png" alt="" class="wp-image-271" width="870" height="101" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-16.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-16-300x35.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-16-768x89.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-16-830x97.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-16-230x27.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-16-350x41.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-16-480x56.png 480w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><em>Content Security Policy</em> not enforced :  Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement to distribution of malware </p>



<figure class="wp-block-image size-large"><img decoding="async" width="945" height="79" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-17.png" alt="" class="wp-image-272" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-17.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-17-300x25.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-17-768x64.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-17-830x69.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-17-230x19.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-17-350x29.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-17-480x40.png 480w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>In addition, the Javascript library jQuery and the HTML framework editor Wysiwyg deserve an update. However, one should balance the pros and cons before doing this (see this blog for more explanatations <a href="https://www.sjoerdlangkemper.nl/2018/10/24/should-you-update-jquery/">https://www.sjoerdlangkemper.nl/2018/10/24/should-you-update-jquery/</a>)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="945" height="174" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-18.png" alt="" class="wp-image-273" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-18.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-18-300x55.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-18-768x141.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-18-830x153.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-18-230x42.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-18-350x64.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-18-480x88.png 480w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p> <strong><span class="has-inline-color has-luminous-vivid-orange-color">Site Reputation</span></strong></p>



<p>There is nothing to be found on <a href="https://talosintelligence.com/reputation_center">https://talosintelligence.com/reputation_center</a> regarding the domain cryptoevo.de (this is what I expected from such a site)</p>



<p> <strong><span class="has-inline-color has-luminous-vivid-orange-color">E-mail reputation</span></strong></p>



<p>Here is the result with the domain cryptoevo.de from <a href="https://senderscore.org/">https://senderscore.org/</a>, all is clear</p>



<figure class="wp-block-image size-large"><img decoding="async" width="945" height="274" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-19.png" alt="" class="wp-image-276" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-19.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-19-300x87.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-19-768x223.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-19-830x241.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-19-230x67.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-19-350x101.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-19-480x139.png 480w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p> <strong><span class="has-inline-color has-luminous-vivid-orange-color">DNSSEC</span></strong></p>



<p>From  <a href="https://gf.dev/dnssec-test">https://gf.dev/dnssec-te</a> , we learn that the domain cryptoevo.de has not configured DNSSEC. Is that an issue ?</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/01/a-20.png" alt="" class="wp-image-277" width="445" height="123" srcset="https://www.forensicxs.com/wp-content/uploads/2020/01/a-20.png 945w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-20-300x83.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-20-768x212.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-20-830x229.png 830w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-20-230x64.png 230w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-20-350x97.png 350w, https://www.forensicxs.com/wp-content/uploads/2020/01/a-20-480x133.png 480w" sizes="(max-width: 445px) 100vw, 445px" /></figure>



<p> DNSSEC adds two important features to the <abbr title="Domain Name System">DNS</abbr> protocol:</p>



<ul class="wp-block-list"><li> Data origin authentication allows a resolver to  cryptographically verify that the data it received actually came from  the zone where it believes the data originated</li><li> Data integrity protection allows the resolver to know that the  data hasn&#8217;t been modified in transit since it was originally signed by  the zone owner with the zone&#8217;s private key</li></ul>



<p> In order for the Internet to have widespread security, <abbr title="DNS Security Extensions">DNSSEC</abbr> needs to be widely deployed. <abbr title="DNS Security Extensions">DNSSEC</abbr>  is not automatic : right now it needs to be specifically enabled by network operators at their recursive resolvers and also by domain name  owners at their zone&#8217;s authoritative servers</p>



<p>Therefore it&#8217;s recommended to implement DNSSEC</p>



<p><span class="has-inline-color has-luminous-vivid-orange-color"><strong>SPF</strong> </span></p>



<p>It&#8217;s Ok as shown by the online test <a href="https://gf.dev/spf-record-test">https://gf.dev/spf-record-test</a></p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Conclusion</span></strong> : overall, the results obtained on the domain cryptoevo.de give us an overall good situation. There are some potential improvements on the web configuration although these are probably due to compatibility requirements. I would still recommend actions to be taken. DNSSEC could be configured without major difficulty. In terms of rating, such a site would get quite a high score, but still fall below the best ones</p>



<p>Overall, cyber security rating is still quite a new business. It&#8217;s certainly due to grow and expand as more regulations are introduced and customer monitoring requirements get higher. Rating agencies will compete even more to build an attractive marketplace and &#8220;occupy the web&#8221;. A rating agency had better be unavoidable as it&#8217;s probable only 2 or 3 will be major players at the end of the day</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.forensicxs.com/cyber-security-rating-in-depth/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching 26/48 queries in 0.015 seconds using Disk

Served from: www.forensicxs.com @ 2026-01-01 22:24:41 by W3 Total Cache
-->