Categories: cyber securityDNS

Behave – A New Browser Extension to Find websites that Perform Browser-Based Port Scans or Attack

A new browser extension published dubbed Behave! that warns the user if the website tries to perform a port scan or launch DNS based attacks.

The web sites port scanning issue came into light after a script found on the eBay website that performs local port scans on a user computer to check for remote access.

The port scanning conducted by LexisNexis’ ThreatMetrix fraud protection script that used to detect fraudulent purchases.

Following to that number of popular websites found using the fraud protection script scans local for remote access programs.

According to report here are some of the popular websites include Citibank, TD Bank, Ameriprise, Chick-fil-A, Lendup, BeachBody, Equifax IQ connect, TIAA-CREF, Sky, GumTree, and WePay port scanning our computers.

Behave! Browser Extension

The extension was created by Stefano Di Paola, co-founder, CTO, and Chief Scientist of MindedSecurity, the extension was created aiming to warn users if the website abuses browser features to scan or to launch any attacks.

The extension monitors and warns the user if they perform any of the following actions:

  • Browser-based Port Scan
  • Access to Private IPs
  • DNS Rebinding attacks to Private IPs

The extension alerts the user if port scanning is performed, the default limit is 20 if the browser session exceeds the limit, then browser extension warns the user.

Also, it alerts users if a web page tries to directly access a local IP and if DNS resolves to a private IP.

“Behave! keeps track if a hostname is resolved with multiple IPs, and will alert if there’s some mixing between public IPs and private ones.”

The extension is available to download for Firefox and Chrome browsers. You can also disable or enable alerts.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and their…

2 hours ago

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…

14 hours ago

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…

19 hours ago

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…

19 hours ago

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…

19 hours ago

Metasploit Framework Released with New Features

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…

22 hours ago