SlideShare a Scribd company logo
1 of 29
Hacker guide to Adobe Flash Security The open doors and the right locks Lecturer: LiorBruder lior@11sheep.com
What’s on the menu Security introduction Flash VM Network security Memory protection Attack servers
Attacker experience Beginner ,[object Object]
 Using ready made tools
 Can make a lot of damage but…
 Can be easily tracked,[object Object]
 Basic knowledge of OS and network
 Search and share information (blogs, forums, etc.),[object Object]
 Strong knowledge of  IT systems, OS, AI, PBX, network, legal issues
 Wide range of resources (Servers, Sniffers, etc.)
 Hard to detect,[object Object]
Hacking types Listening on the network (Cloud)  Hacker Server User
Flash VM (1)
Flash VM (2)
SWF file structure Every SWF file is open source
Demonstrations Decompiling SWF file Obfuscating SWF file
So, how to secure you SWF? Put logic on server Code obfuscation Do not hardcode
Network layers
Packet sniffing ,[object Object]
 Charles (Layers 6-7)
 Fiddler (Layers 6-7)
WireShark (Layers 2-7),[object Object]
So, How to protect your data? Use binarry data instead of text /XML Hash your data (MD5, Sha1)  Use sessions Use secure channel (SSL/RTMPE) Time changing password Use common logic
Secured loading Step 4  - Decrypt SWF data and load SWF (SWFLoader) Step 1  - Download only frame application Step 3  - Download main app Client Server Step 2  - Open encrypted channel (SSL)
Memory protection You don’t know where your SWF will be used There are many memory viewers (like Cheat engine http://www.cheatengine.org/ )
Demonstrations Changing data on SWF file
So, how to protect memory? Scramble important data (Random) Use checksum on data Don’t count on garbage collection
Why use attack server? Cause DOS Damage remote site database Multiple registrations Login to accounts  Many more
Passwords protection Encourage the user to use complex password Don’t use trivial combinations Hash the password (MD5) IPtoLocation filter Use smart captcha

More Related Content

What's hot

A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
wolverine0614
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Password hacking
Password hackingPassword hacking
Password hacking
Abhay pal
 
Razif Ben Syena 7a Creation
Razif Ben Syena 7a CreationRazif Ben Syena 7a Creation
Razif Ben Syena 7a Creation
guest3e10043
 
20120512 persona mdn_hackday_ldn
20120512 persona mdn_hackday_ldn20120512 persona mdn_hackday_ldn
20120512 persona mdn_hackday_ldn
teoli2003
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 

What's hot (20)

Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Network Security
Network SecurityNetwork Security
Network Security
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
Computer security
Computer securityComputer security
Computer security
 
Soham web security
Soham web securitySoham web security
Soham web security
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Internet Security Guidelines for Teachers and Students
Internet Security Guidelines for Teachers and Students    Internet Security Guidelines for Teachers and Students
Internet Security Guidelines for Teachers and Students
 
Razif Ben Syena 7a Creation
Razif Ben Syena 7a CreationRazif Ben Syena 7a Creation
Razif Ben Syena 7a Creation
 
20120512 persona mdn_hackday_ldn
20120512 persona mdn_hackday_ldn20120512 persona mdn_hackday_ldn
20120512 persona mdn_hackday_ldn
 
Password Attack
Password AttackPassword Attack
Password Attack
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Encrip 2.0
Encrip 2.0Encrip 2.0
Encrip 2.0
 
How does Ransomware Works?
How does Ransomware Works? How does Ransomware Works?
How does Ransomware Works?
 

Similar to Hacker guide to adobe flash security

Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
drkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
bestip
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 

Similar to Hacker guide to adobe flash security (20)

Windows network security
Windows network securityWindows network security
Windows network security
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.ppt
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.ppt
 
01-intro-thompson.ppt
01-intro-thompson.ppt01-intro-thompson.ppt
01-intro-thompson.ppt
 
cyber sec.ppt
cyber sec.pptcyber sec.ppt
cyber sec.ppt
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Hacker guide to adobe flash security

  • 1. Hacker guide to Adobe Flash Security The open doors and the right locks Lecturer: LiorBruder lior@11sheep.com
  • 2. What’s on the menu Security introduction Flash VM Network security Memory protection Attack servers
  • 3.
  • 4. Using ready made tools
  • 5. Can make a lot of damage but…
  • 6.
  • 7. Basic knowledge of OS and network
  • 8.
  • 9. Strong knowledge of IT systems, OS, AI, PBX, network, legal issues
  • 10. Wide range of resources (Servers, Sniffers, etc.)
  • 11.
  • 12. Hacking types Listening on the network (Cloud) Hacker Server User
  • 15. SWF file structure Every SWF file is open source
  • 16. Demonstrations Decompiling SWF file Obfuscating SWF file
  • 17. So, how to secure you SWF? Put logic on server Code obfuscation Do not hardcode
  • 19.
  • 22.
  • 23. So, How to protect your data? Use binarry data instead of text /XML Hash your data (MD5, Sha1) Use sessions Use secure channel (SSL/RTMPE) Time changing password Use common logic
  • 24. Secured loading Step 4 - Decrypt SWF data and load SWF (SWFLoader) Step 1 - Download only frame application Step 3 - Download main app Client Server Step 2 - Open encrypted channel (SSL)
  • 25. Memory protection You don’t know where your SWF will be used There are many memory viewers (like Cheat engine http://www.cheatengine.org/ )
  • 27. So, how to protect memory? Scramble important data (Random) Use checksum on data Don’t count on garbage collection
  • 28. Why use attack server? Cause DOS Damage remote site database Multiple registrations Login to accounts Many more
  • 29. Passwords protection Encourage the user to use complex password Don’t use trivial combinations Hash the password (MD5) IPtoLocation filter Use smart captcha
  • 30. Passwords (1) Encourage the user to use complex password
  • 31. Passwords (2) Block trivial combinations You details: Name: Liorbruder Birthdate: 16/7/1983 Id number: 033099124 Common passwords: Liorbruder Lior1 Lior16071983 Bruderlior Brudergmail 033099124
  • 32. Passwords (3) Hash the password (MD5)
  • 33. Passwords (3) Trivial passwords will be easy to detect PasswordHash lior1 - e9d9dc5987d3fd2369e10ed0a8c32d8a good - 7faae226566c91d06a0d741e0c9d3ae6 bruder - e9d9dc5987d3fd2369e10ed0a8c32d8a test - 098f6bcd4621d373cade4e832627b4f6
  • 34. Passwords (4) How to steal captcha On your site Somewhere on the internet… Welcome to my site Do you want to see the next picture? User name: Password: For security please retype the following characters:
  • 35.