Webmasters can track all your activities on the Internet – even if you have already cleared your browsing history and deleted all saved cookies.





A researcher demonstrated two unpatched flaws that can be exploited to track Millions of Internet users, allowing malicious website owners:

List Building: To compile a list of visited domains by users, even if they have cleared their browsing history Tracking Cookies: To tag users with a tracking cookie that will persist even after they have deleted all cookies

These two Browser Fingerprinting techniques abuse HTTP Strict Transport Security (HSTS) and Content Security Policy – new security features already built into Mozilla Firefox and Google Chrome, and expected to make their ways to other mainstream browsers in near future.





WHAT IF, The Website owners turn these Security features against You?





A security researcher has proved exactly the same last weekend at Toorcon security conference in San Diego.

Yan Zhu, an independent security researcher, demonstrated how websites can abuse HSTS protections and Content Security Policy to track even the most paranoid user, allowing a website to sniff a user's previously visited domains.

Yes, despite its obvious relation with 'Strictness' and 'Security', HTTP Strict Transport Security (HSTS) can be abused to keep track of you whenever you visit a website, even though it claims to keep your communication with that site more secure.





Hard to Believe?





Visit this web page https://zyan.scripts.mit.edu/sniffly/ yourself in Chrome, Firefox, or Opera and you will probably end up with an accurate list of websites you have and have not visited.





How Does Sniffly Work?





The exploit attempts to embed non-existent images from various HSTS-protected domains over HTTP.





Sniffly then uses JavaScript to detect whether or not your web browser can establish a secure connection with those websites.

If you have visited the HSTS website before, it will connect within few milliseconds. But, if it takes longer to connect, there's a chance that you have never visited the HSTS website before.





This browser fingerprinting technique is a simple method to sniff a quick list of which secure sites a user has and hasn't visited.





Video Demonstration





proof-of-concept attack site, which she has dubbed Sniffly , to showcase her attack, and also posted its source code on Zhu has developed thisproof-of-concept attack site, which she has dubbed, to showcase her attack, and also posted its source code on GitHub . You can also watch the video of her presentation below.







Certificate Pinning Tracks You even after Deleting Cookies



Besides tracking browser history, Zhu also demonstrated how a website can track Google Chrome users even if they delete all cookies after every visit.





Supercookie' technique abuses weaknesses in HTTP public key pinning (Certificate Pinning. Instead of exploiting HSTS, the '' technique abuses weaknesses inHTTP public key pinning ( HPKP ), also known as





HPKP is a security measure designed to protect users against certificate forgeries by allowing websites to specify which certificate authorities have issued valid certs for their websites, rather than accepting any one of the hundreds of built-in root certificates.





Sniffly can abuse the standard by pinning text that is unique to each visitor, thereby reading the text on subsequent visits and using the unique text it would use a browser cookie to track the site habits of a user.



Few Limitations



However, unlike a browser cookie, the certificate pin will remain intact even after the cookies are deleted.





The fingerprint-sniffing attack developed by the researcher, for instance, records only the domain and subdomains, instead of full URLs. Also, it only tracks visits to HSTS-protected sites for now.





Moreover, the results aren't accurate for people using the HTTPS Everywhere browser plugin, however, such shortcomings can likely be overcome with code modifications and refinements in the future.



