• coherent_domain@infosec.pub
    link
    fedilink
    English
    arrow-up
    27
    ·
    edit-2
    3 days ago

    In general only click on a link if you trust the domain. A URL usually looks like this: https://first.second.third/… And only the second and the thrid word between dots are important.

    For example: https://suspicious.google.com/ is in general fine, since the second and third word is google.com . However, https://lemmy.legit-lemmy.world/ is unsafe, because the second and thrid word are legit-lemmy.world, but not lemmy.world.

    There are ways to smuggle unsafe asset under legit URL, usually by uploading them on google drive, github etc. The good rule of thumb is to never run anything on your computer unless you are absolutely sure it comes from trusted source, like from official website.

    Official download webpage tends to have very descriptive and short URL, like

    If you see long random strings on the download webpage then it is likely unsafe, for example:

    • Successful_Try543@feddit.org
      link
      fedilink
      arrow-up
      13
      ·
      edit-2
      3 days ago

      Recently it has become a problem that optical twins of legit URLs exist, where some letters have been replaced by alike letters (homoglyphs) from different alphabets, see e.g. the list in this link.

      Edit: Edge and Vivaldi seem to replace those letters by Punycode automalically, where in Firefox network.IDN_show_punycode needs to be enabled in the about:config.
      bleepingcomputer.com

      • tyler@programming.dev
        link
        fedilink
        arrow-up
        4
        ·
        3 days ago

        I’m pretty sure ff shows punycode automatically. I’ve never had to touch it at least and I get punycode.

            • tyler@programming.dev
              link
              fedilink
              arrow-up
              1
              ·
              1 day ago

              🌽.ws

              Should transform to https://🌽.ws/ when you click it. The xn— is the punycode prefix.

              Here’s how Punycode works:

              Unicode characters are first converted into a series of code points, which are represented as a series of numbers. The code points are then converted into a series of ASCII characters, using a specific algorithm. The ASCII characters are then prepended with “xn–”, which is a special prefix that indicates that the following characters are encoded in Punycode.

              For example, the Unicode character 快 (which means fast in Chinese) is represented as the code point “U+5FEB”. This code point is then converted into the ASCII characters “2s5v”, which is prepended with the “xn–” prefix to give us “xn–2s5v”. This can then be used as part of a domain name.

              When the domain name is displayed to a user, the Punycode is converted back into Unicode characters, so that the user sees the original characters rather than the encoded version. This allows users to use and read domain names in their native scripts, even if their computer or device doesn’t support those scripts.

              https://www.link-assistant.com/seo-wiki/punycode/

              • joshchandra@midwest.social
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                1 day ago

                Huh. Well, I was watching the URL bar the entire time and it only moved directly from the emoji to the X tweet; I never saw your decoded URL, unless it simply happens that fast, or I’m misunderstanding your last paragraph and that’s what was supposed to happen.

                Also, that’s one heck of a short link, haha.

                • tyler@programming.dev
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  4 hours ago

                  Might be because it’s a redirect… or maybe Firefox shows emojis directly but not other punycode?

  • edric@lemm.ee
    link
    fedilink
    arrow-up
    6
    ·
    3 days ago

    Someone else already mentioned it, but virustotal can check if the url is malicious. It’s not 100% of course but more often than not it will catch a malicious url. It’s a quick and easy way to check on-the-fly.

  • NutinButNet
    link
    fedilink
    English
    arrow-up
    6
    ·
    3 days ago

    You can check URLs and files at virustotal.com for free.

    If you have Windows 10/11 Pro and your computer supports virtualization, you can enable the Windows Sandbox in Windows Features too. This creates a temporary virtual machine with the bare essentials and no antivirus built in for testing stuff like this to see what the worst case scenario is if you visited/accessed.

      • NutinButNet
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 days ago

        I’m not familiar on that platform, unfortunately, as I’m on iPhone.

        But I think you should still be able to use virustotal’s website on mobile to check websites and also files.

        There may be a sandbox app available for Android, but I’m not aware of any particular ones to recommend.

  • joshchandra@midwest.social
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    3 days ago

    From gentlest to strongest intensity:

    I use all 3. NoScript actually isn’t needed for uBlock Origin and any forks of it like AdNauseam because they can also selectively disable/enable JavaScript, but I can’t seem to find the section to do so in AdNauseam…