Scan any website for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, supercookies, evercookies as well as SSL/TLS and HTTP security

Cookie and Security Scan Report

http://delivery.g.switchadhub.com/

Session cookies are cleared when you close your browser and allow the website to identify user's state — such as logged-in users. They are mostly considered harmless because they cannot be used for long-term user tracking. This site sets 1 session cookies.

Third-party domains is the count of organisations allowed by the webmaster to trace your across the site. These cookies may be set for various purposes, like tracking ads displayed on the website, collection of statistics, targeted advertising etc. This website allows 1 other websites to track your activity.

Persistent cookies are the cookies that are preserved through browser shutdowns. This means, even if you close this page today and ever return there in future, the website will know you're a returning visitor. This may be used for "remember me" features, as well as persistent user tracking. These cookies, especially if set by third party organisations, are powerful tool for monitoring your activities across all the websites you visit. This website sets 0 persistent cookies with average life-time of days and longest None days.

Last fetched: 2017-03-20T22:25:39.977912+00:00
HTTP status: 400

Cookies and Privacy Attributes

HAProxy load-balancer session tracking cookie » More...
  • Type: HTTP Cookie
  • Domain: delivery.g.switchadhub.com
  • The cookie is only valid during current browser session and it will be deleted when you close browser
  • httpOnly This cookie does not set httpOnly and can be read by JavaScript. This might be a problem if this cookie contains an authentication-related session token » More...
  • Size: 30 bytes
  • Sample value:
    delivery-014.g.switchadhub.com

TLS/SSL configuration report

The score reflects overall compliance of the server's TLS configuration with published industry best practices. The score follows the SSL Labs scoring methodology version 2009k but as SSL Labs scoring is not fully documented the results may differ at times. You may want to cross-check the results at SSL Labs page.

Grade capped at C
RC4 cipher-suites should no longer be used
SSLv3
The server supports SSLv3 protocol which is vulnerable to POODLE attack and considered weak. This version is deprecated since 2015 (RFC 7568).
Supported cipher-suites
  • TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits
  • TLS_RSA_WITH_AES_256_CBC_SHA 256 bits
  • TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits PFS: ECDH 256 bits
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits PFS: DH 2048 bits
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits PFS: DH 2048 bits
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits PFS: DH 2048 bits
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits PFS: DH 2048 bits
  • TLS_RSA_WITH_RC4_128_MD5 128 bits WEAK
  • TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits
  • TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits
  • TLS_RSA_WITH_RC4_128_SHA 128 bits WEAK
  • TLS_RSA_WITH_IDEA_CBC_SHA 128 bits WEAK
  • TLS_RSA_WITH_AES_128_CBC_SHA 128 bits
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits
  • TLS_RSA_WITH_SEED_CBC_SHA 128 bits
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits PFS: ECDH 256 bits WEAK
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits PFS: ECDH 256 bits
  • TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits PFS: DH 2048 bits
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits PFS: DH 2048 bits
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits PFS: DH 2048 bits
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits PFS: DH 2048 bits
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits PFS: DH 2048 bits
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits WEAK
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits PFS: ECDH 256 bits WEAK
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits PFS: DH 2048 bits WEAK

LocalStorage objects

HTML5 LocalStorage is client-side storage introduced by HTML5 and supported by all major browsers. Data stored there is not sent automatically by the browser (unlike HTTP cookies) but is accessible to JavaScript code permanently, until deleted by the application or cleaned manually by the user. These object can be thus compared to first-party persistent cookies from privacy point of view.

No localStorage objects

SessionStorage objects

HTML5 SessionStorage is client-side storage introduced by HTML5 and supported by all major browsers. Data stored there is not sent automatically by the browser (unlike HTTP cookies) but is accessible to JavaScript code during the browser session only, so until the browser window or tab is closed. These object can be thus compared to first-party session cookies from privacy point of view.

No localStorage objects

Adobe Flash Shared Objects

Adobe Flash Shared Object is a cookie-like, client-side data storage facility used by Flash applications. Local Shared Objects are pretty much like same-origin cookies, retrieved by an application running on the same page, while Remote Shared Objects are stored by the application on a third-party server.

No Flash Shared Objects yet

Canvas Trackers

Canvas fingerprinting is a relatively new user tracking technique that uses the new drawing feature in HTML5 called "canvas". It bypassess all the typical cookie or Flash control techniques and allows to identify unique browsers with high likelihood.

No trackers found.

HTTP security related headers

Missing: X-Frame-Options
This headers prevents the page from being displayed in FRAME or IFRAME, mitigating ClickJacking attacks and is recommended for most websites with a login form or transactional features » More... The header is not set See who sets it...
Missing: Content-Security-Policy
Allows fine-grained control over what content is allowed to be loaded on this website. It's a powerful security feature that is strongly recommended. » More... This website does not use CSP, try using CspBuilder » See who does...
Missing: X-Content-Type-Options
Disables naive file type guessing in browsers, preventing some malicous content download attacks. It should be always set on API (JSON, XML) responses and is recommended on all other responses as well » More... This website does not set the header » See who does...

Other interesting HTTP headers

crossdomain.xml
This file defines the cross-domain policy for Adobe applications. Dangerous if permissive or too broadly set » More... The website sets permissive cross-domain policy <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*" /> </cross-domain-policy>. Read here to see how this can be abused.