Hyperlink Auditing in Chrome & Firefox browsers

Sometimes, novice or innocent users can be tricked to unwittingly participate if sends information to another resource. This may add a privacy risk. For instance, HTML5 has added a feature to the web called Hyperlink Auditing. If you are not aware of this feature, Hyperlink auditing is added to a web page or created by an area element that has a ping attribute.

Hyperlink Auditing Pings

It is normally used by sites to track link clicks but has also been found to be abused by cyber-criminals to pass the massive amount of web requests to sites in an attempt to take them offline. So, how to disable this feature in your Chrome or Firefox browser? Also, let us try to answer a few questions related to it.

We’ll proceed in 2 steps-

  1. Disable Hyperlink auditing
  2. Determine if Hyperlink auditing good or bad

Hyperlink auditing is an HTML standard that allows the creation of special links that ping back to a specified URL when they are clicked on. These pings are done in the form of a POST request to the specified web page that can then examine the request headers to see what page the link was clicked on.

1] Disable Hyperlink auditing

Firefox is one of the few browsers that have the ping attribute disabled by default. You can verify it by opening the browser and taking a look at about:config >  browser.send_pings entry value. See the screenshot below for more information.

Hyper auditing

Chrome is planning to remove this ability in future versions. However, you can still disable it by opening chrome://flags#disable-hyperlink-auditing and setting the flag to Disabled.

For your information in newer versions, Hyperlink ping tracking feature will be enabled by default, and so you may not see these flags in your browser.

2] Is Hyperlink auditing good or bad

There was a report sometime earlier; it suggested that a new type of DDoS attack abuses the HTML5 Ping-based hyperlink auditing feature.

The attack primarily involves users innocently visiting a crafted web page with two external JavaScript files. One of which includes an array containing URLs (believed to be targets of the DDoS attack. The second JavaScript file had a function that randomly selected an URL from the array, created the <a> tag with a ‘ping’ attribute, and pro-grammatically clicked the link every second. This enabled attackers to send hyperlink auditing ping to the target so long the web page was opened. As such, rather than vulnerability, the attack relied on turning a legitimate feature into an attack tool.

This is a worrying trend, and so Hyperlink auditing is generally not considered as a good idea.

Posted by on , in Category Security with Tags
The author Hemant Saxena is a post-graduate in bio-technology and has an immense interest in following Windows, Office and other technology developments. Quiet by nature, he is an avid Lacrosse player. Creating a System Restore Point first before installing a new software, and being careful about any third-party offers while installing freeware is recommended.

Leave a Reply

Your email address will not be published. Required fields are marked *


4 + 3 =