Zombie browsers spiced with rootkit extensions - DefCamp 2012

DefCamp
DefCampDefCamp
Introduction


Zoltán Balázs
ITSEC consultant

Deloitte Hungary
Instructor @NetAkademia.hu
OSCP, CISSP, C|HFI, CPTS, MCP
http://www.slideshare.net/bz98



Cyberlympics finals 2012 - 2nd runner up
I love Hacking
I love Zombie movies
I love LOLcats
Zombies + Hacking +
LOLcats = I R ZOMBIE
Zombie browsers,
         spiced with rootkit extensions


                                       DefCamp 2012

•   Legal disclaimer:

•   Every point of views and thoughts are mine.

•   The next presentation’s contents do not have any connection with my employers opinion, whether past, present or future.

•   What you will hear can be only used in test labs, and only for the good.
About:presentation

• History of malicious extensions (add-on, plug-in,
   extension, BHO)

• Focus on Firefox, Chrome, Safari
• Advantages – disadvantages
• Browser extension rootkits
• Live demo – home made extension
Zombie browsers spiced with rootkit extensions - DefCamp 2012
History of malicious
     Firefox extensions

• 90% of malicious extensions were created for
   Facebook spamming

• 2004-2010: 5
• 2011: 5
• Jan 01, 2012 – Oct 23, 2012: 49*

                                     *Data from mozilla.org
More examples
       on Facecrook




Text




             ©f-secure
My zombie extension
• Command and Control
• Stealing cookies, passwords
• Uploading/downloading files (Firefox,
  Chrome NPAPI on todo list)

• Binary execution (Firefox - Windows, Chrome
  NPAPI on todo list)

• Geolocation
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Safari demo
Installing the
  extension
    Physical access
  Social Engineering
Remote code execution –
without user interaction
Firefox rootkit 1
• Hook into other extension (even signed ones)
Firefox rootkit 2
•visible = false
Firefox rootkit 3
•seen in the wild
Risks of a Zombie Browser




•Eats your brain while you are asleep
Risks of a Zombie Browser
Risks of a Zombie Browser


•Firewall/proxy 
•Local firewall 
•Application whitelisting 
•Web-filtering 
Risks of a Zombie Browser
•   Cross-platform 

•   Cross-domain Universal XSS 

•   Every secret is available 

    •   Password input method does not matter (password
        safe, virtual keyboard, etc.)

    •   Before SSL (+JS obfuscation)

•   Malicious source codes are available 

•   Advantage against meterpreter 

    •   exe/dll is not needed for persistence
Risks of a zombie browser

• Low AV signature based detection rate 
• Sample from January 2011. – October 2012.


             0/40




• Extension vs. behavioral based detection 
Risks of a zombie browser

• Low AV signature based detection rate 
• Sample from January 2011. – October 2012.


            0/40



• Extension vs. behavioral based detection 
Friendly message to AV
developers: try harder…
Code snippets from undetected malicious browser
extension
var
_0x39fe=["x73x63x72x69x70x74","x63x72x65x61x7
4x65x45x6Cx65x6Dx65x6E
x74","x74x79x70x65","x74x65x78x74…
_0xaed4=[_0x39fe[0],_0x39fe[1],_0x39fe[2],_0x39fe[3],_0x39fe[4],
_0x39fe[5],_0x39fe[6],_0x39fe[7],_0x39fe[8],_0x39fe[9]];

keylogger_namespace.keylogger…

for(var x in mothership){if (mothership[x].command == "eval")
Profit ...
Firefox
Disadvantages (for the
              Hacker)
•   Not a real rootkit

•   Browser limitations (eg. portscan)

•   Platform limitations (eg. Execute binary code only on Windows)

•   Runs in user space

•   Runs only when browser is open

•   Extensions are not yet supported in:

    •   Chrome on Android/iOS

    •   Safari on iOS
Gmail demo
• defeat 2 step verification
• Why Google?
• Hacking “the others” is boring
 • clear text cookies
 • missing 2 step verification
 • no concurrent session detection
Gmail demo


•defeat 2 step verification
One                         to rule them all
•   Cookie + password stealing – defeat Google 2-step verification

•   Use password reset on other sites linked to G-mail (Paypal, etc.)

•   Install any app from Google Play to victim’s Android phone

•   Access Android WIFI passwords

•   Access to Google+, Docs, Picasa, Blogger, Contacts, Web history,
    Checkout, Apps, OpenID

•   Backdooring Google account

    •   Adding application specific password

    •   Stealing backup codes

    •   G-mail mail forward rule
Chrome - rootkit
Chrome - distributed
 password hash cracking
• Idea and coding by my friend and colleague, WoFF
• Password hash cracking performance
 • Javascript: 82,000 hash/sec
 • Chrome native client: 840,000 hash/sec
 • Native code (john): 11,400,000 hash/sec
Zombie Android


•Android SQLite Journal Information
  Disclosure (CVE-2011-3901)

•Android 2.3.7
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Firefox webcam
Browser extensions might be bad

•   @antivirus developers

    •   Be reactive

    •   The browser is the new OS

•   @browser developers (Mozilla)

    •   Default deny installing extensions from 3rd-party sites

    •   Chrome-level security

    •   Require permissions

    •   Extension components – separate privileges

•   @browser developers (Google) – keep on the good job

    •   but disable NPAPI :)
Browser extensions might be bad

•   @website developers

    •   There is no prevention against password stealing

    •   Cookie-stealing

    •   Restrict session to IP (by default)

•   @users

    •   Beware of malicious browser extensions

    •   Use separated OS for e-banking and other sensitive stuff

    •   Removing malicious extensions - create new clean profile in clean OS

•   @companies

    •   Control which browsers users can use

    •   Restrict extensions via GPO
One more thing ...
Zombie browsers spiced with rootkit extensions - DefCamp 2012
References
•   Grégoire Gentil: Hack any website, 2003

•   Christophe Devaux, Julien Lenoir: Browser rootkits, 2008

•   Duarte Silva: Firefox FFSpy PoC, 2008

•   Andreas Grech: Stealing login details with a Google
    Chrome extension, 2010

•   Matt Johansen, Kyle Osborn: Hacking Google ChromeOS,
    2011

•   Nicolas Paglieri: Attacking Web Browsers, 2012
Browser extensions might be bad,
                   Mmmkay???
                 zbalazs@deloittece.com
                 zbalazs4
                 hu.linkedin.com/in/zbalazs

                 Code released under GPL
                 http://github.com/Z6543/
                 ZombieBrowserPack

                 Greetz to @hekkcamp
1 of 45

Recommended

[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012 by
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012Zoltan Balazs
1.3K views47 slides
Browser Security by pratimesh Pathak ( Buldhana) by
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Pratimesh Pathak
1.3K views16 slides
Web Security - Introduction v.1.3 by
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Oles Seheda
78.6K views69 slides
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn by
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnFelipe Prado
87 views48 slides
Introduction to web security @ confess 2012 by
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012jakobkorherr
2.4K views70 slides
ECrime presentation - A few bits about malware by
ECrime presentation - A few bits about malwareECrime presentation - A few bits about malware
ECrime presentation - A few bits about malwareMichael Hendrickx
1K views20 slides

More Related Content

What's hot

Web Security: A Primer for Developers by
Web Security: A Primer for DevelopersWeb Security: A Primer for Developers
Web Security: A Primer for DevelopersMike North
1.1K views44 slides
Webinar On Ethical Hacking & Cybersecurity - Day2 by
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
1.6K views17 slides
Introduction to Web Application Security - Blackhoodie US 2018 by
Introduction to Web Application Security - Blackhoodie US 2018Introduction to Web Application Security - Blackhoodie US 2018
Introduction to Web Application Security - Blackhoodie US 2018Niranjanaa Ragupathy
10.4K views119 slides
Wi-Fi Hotspot Attacks by
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksGreg Foss
10.3K views73 slides
Analysis of web application worms and viruses by
Analysis of web application worms and virusesAnalysis of web application worms and viruses
Analysis of web application worms and virusesUltraUploader
389 views61 slides
Help AG spot light - social engineering by
Help AG spot light - social engineeringHelp AG spot light - social engineering
Help AG spot light - social engineeringMichael Hendrickx
986 views11 slides

What's hot(18)

Web Security: A Primer for Developers by Mike North
Web Security: A Primer for DevelopersWeb Security: A Primer for Developers
Web Security: A Primer for Developers
Mike North1.1K views
Webinar On Ethical Hacking & Cybersecurity - Day2 by Mohammed Adam
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam1.6K views
Introduction to Web Application Security - Blackhoodie US 2018 by Niranjanaa Ragupathy
Introduction to Web Application Security - Blackhoodie US 2018Introduction to Web Application Security - Blackhoodie US 2018
Introduction to Web Application Security - Blackhoodie US 2018
Niranjanaa Ragupathy10.4K views
Wi-Fi Hotspot Attacks by Greg Foss
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
Greg Foss10.3K views
Analysis of web application worms and viruses by UltraUploader
Analysis of web application worms and virusesAnalysis of web application worms and viruses
Analysis of web application worms and viruses
UltraUploader389 views
Dark alleys-2015 by Greg Parmer
Dark alleys-2015Dark alleys-2015
Dark alleys-2015
Greg Parmer154 views
BugBounty Roadmap with Mohammed Adam by Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam735 views
Firewalls (Distributed computing) by Sri Prasanna
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)
Sri Prasanna1.1K views
Case Study of Django: Web Frameworks that are Secure by Default by Mohammed ALDOUB
Case Study of Django: Web Frameworks that are Secure by DefaultCase Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB9.3K views
Owasp advanced mobile-application-code-review-techniques-v0.2 by drewz lin
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2
drewz lin2.5K views
Thoughts on Defensive Development for Sitecore by PINT Inc
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for Sitecore
PINT Inc3.1K views
Html5 security by Krishna T
Html5 securityHtml5 security
Html5 security
Krishna T2.6K views

Viewers also liked

Advanced data mining in my sql injections using subqueries and custom variables by
Advanced data mining in my sql injections using subqueries and custom variablesAdvanced data mining in my sql injections using subqueries and custom variables
Advanced data mining in my sql injections using subqueries and custom variablesDefCamp
4.9K views20 slides
Securitatea in secolul 21 by
Securitatea in secolul 21Securitatea in secolul 21
Securitatea in secolul 21DefCamp
768 views24 slides
Atac asupra Sim Toolkit by
Atac asupra Sim ToolkitAtac asupra Sim Toolkit
Atac asupra Sim ToolkitDefCamp
1.8K views56 slides
The importance of logs - DefCamp 2012 by
The importance of logs - DefCamp 2012The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012DefCamp
808 views13 slides
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps by
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp
1K views28 slides
DefCamp 2013 - Android hacking techniques by
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp
2.1K views14 slides

Viewers also liked(19)

Advanced data mining in my sql injections using subqueries and custom variables by DefCamp
Advanced data mining in my sql injections using subqueries and custom variablesAdvanced data mining in my sql injections using subqueries and custom variables
Advanced data mining in my sql injections using subqueries and custom variables
DefCamp4.9K views
Securitatea in secolul 21 by DefCamp
Securitatea in secolul 21Securitatea in secolul 21
Securitatea in secolul 21
DefCamp768 views
Atac asupra Sim Toolkit by DefCamp
Atac asupra Sim ToolkitAtac asupra Sim Toolkit
Atac asupra Sim Toolkit
DefCamp1.8K views
The importance of logs - DefCamp 2012 by DefCamp
The importance of logs - DefCamp 2012The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012
DefCamp808 views
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps by DefCamp
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp1K views
DefCamp 2013 - Android hacking techniques by DefCamp
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniques
DefCamp2.1K views
High Security Web Server by DefCamp
High Security Web ServerHigh Security Web Server
High Security Web Server
DefCamp805 views
DefCamp 2013 - MSF Into The Worm Hole by DefCamp
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm Hole
DefCamp1.1K views
A methodology to detect and characterize kernel level rootkit exploits involv... by UltraUploader
A methodology to detect and characterize kernel level rootkit exploits involv...A methodology to detect and characterize kernel level rootkit exploits involv...
A methodology to detect and characterize kernel level rootkit exploits involv...
UltraUploader158 views
Stealthy Rootkit : How bad guy fools live memory forensics? - PacSec 2009 by Tsukasa Oi
Stealthy Rootkit : How bad guy fools live memory forensics? - PacSec 2009Stealthy Rootkit : How bad guy fools live memory forensics? - PacSec 2009
Stealthy Rootkit : How bad guy fools live memory forensics? - PacSec 2009
Tsukasa Oi1.2K views
Applying Memory Forensics to Rootkit Detection by Igor Korkin
Applying Memory Forensics to Rootkit DetectionApplying Memory Forensics to Rootkit Detection
Applying Memory Forensics to Rootkit Detection
Igor Korkin6.6K views
Eu te amo unçao de deus by PHABLO B
Eu te amo unçao de deusEu te amo unçao de deus
Eu te amo unçao de deus
PHABLO B143 views
Meu tesouro pri cruz by PHABLO B
Meu tesouro pri cruzMeu tesouro pri cruz
Meu tesouro pri cruz
PHABLO B465 views
Impact of le arrivals and departures on buffer by ingenioustech
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
ingenioustech392 views
Getting to Know Open Government Data: Who's done it, how did they do, and so ... by jimduncan4
Getting to Know Open Government Data: Who's done it, how did they do, and so ...Getting to Know Open Government Data: Who's done it, how did they do, and so ...
Getting to Know Open Government Data: Who's done it, how did they do, and so ...
jimduncan4891 views
Salvador palau molins francolí by Antoni Aixalà
Salvador palau molins francolíSalvador palau molins francolí
Salvador palau molins francolí
Antoni Aixalà894 views

Similar to Zombie browsers spiced with rootkit extensions - DefCamp 2012

[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions by
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensionsZoltan Balazs
791 views51 slides
Hacktivityonly 121013141039-phpapp02 by
Hacktivityonly 121013141039-phpapp02Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02Комсс Файквэе
291 views47 slides
CSW2017 Geshev+Miller logic bug hunting in chrome on android by
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCanSecWest
7.7K views73 slides
Malware cryptomining uploadv3 by
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3Setia Juli Irzal Ismail
777 views83 slides
Ransomware - what is it, how to protect against it by
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itZoltan Balazs
2.2K views40 slides
Sandbox detection: leak, abuse, test - Hacktivity 2015 by
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Zoltan Balazs
3.7K views58 slides

Similar to Zombie browsers spiced with rootkit extensions - DefCamp 2012(20)

[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions by Zoltan Balazs
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Zoltan Balazs791 views
CSW2017 Geshev+Miller logic bug hunting in chrome on android by CanSecWest
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CanSecWest7.7K views
Ransomware - what is it, how to protect against it by Zoltan Balazs
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
Zoltan Balazs2.2K views
Sandbox detection: leak, abuse, test - Hacktivity 2015 by Zoltan Balazs
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
Zoltan Balazs3.7K views
Web Security - Introduction by SQALab
Web Security - IntroductionWeb Security - Introduction
Web Security - Introduction
SQALab32.7K views
Html5: Something wicked this way comes (Hack in Paris) by Krzysztof Kotowicz
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)
Krzysztof Kotowicz15.4K views
A Brave New World by SensePost
A Brave New WorldA Brave New World
A Brave New World
SensePost3K views
Social and Mobile and Cloud OH MY! by InnoTech
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
InnoTech404 views
Metasploitation part-1 (murtuja) by ClubHack
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)
ClubHack1.6K views
External JavaScript Widget Development Best Practices by Volkan Özçelik
External JavaScript Widget Development Best PracticesExternal JavaScript Widget Development Best Practices
External JavaScript Widget Development Best Practices
Volkan Özçelik4.8K views
Java scriptwidgetdevelopmentjstanbul2012 by Volkan Özçelik
Java scriptwidgetdevelopmentjstanbul2012Java scriptwidgetdevelopmentjstanbul2012
Java scriptwidgetdevelopmentjstanbul2012
Volkan Özçelik324 views
External JavaScript Widget Development Best Practices (updated) (v.1.1) by Volkan Özçelik
External JavaScript Widget Development Best Practices (updated) (v.1.1) External JavaScript Widget Development Best Practices (updated) (v.1.1)
External JavaScript Widget Development Best Practices (updated) (v.1.1)
Volkan Özçelik4.3K views
Forensics WS Consolidated by Karter Rohrer
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
Karter Rohrer244 views

More from DefCamp

Remote Yacht Hacking by
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
1.7K views89 slides
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
974 views167 slides
The Charter of Trust by
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
558 views24 slides
Internet Balkanization: Why Are We Raising Borders Online? by
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
309 views22 slides
Bridging the gap between CyberSecurity R&D and UX by
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
260 views13 slides
Secure and privacy-preserving data transmission and processing using homomorp... by
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
470 views102 slides

More from DefCamp(20)

Remote Yacht Hacking by DefCamp
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
DefCamp1.7K views
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp974 views
The Charter of Trust by DefCamp
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp558 views
Internet Balkanization: Why Are We Raising Borders Online? by DefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp309 views
Bridging the gap between CyberSecurity R&D and UX by DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp260 views
Secure and privacy-preserving data transmission and processing using homomorp... by DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp470 views
Drupalgeddon 2 – Yet Another Weapon for the Attacker by DefCamp
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp269 views
Economical Denial of Sustainability in the Cloud (EDOS) by DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp254 views
Trust, but verify – Bypassing MFA by DefCamp
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp323 views
Threat Hunting: From Platitudes to Practical Application by DefCamp
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp218 views
Building application security with 0 money down by DefCamp
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
DefCamp179 views
Implementation of information security techniques on modern android based Kio... by DefCamp
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp215 views
Lattice based Merkle for post-quantum epoch by DefCamp
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp241 views
The challenge of building a secure and safe digital environment in healthcare by DefCamp
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp323 views
Timing attacks against web applications: Are they still practical? by DefCamp
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp258 views
Tor .onions: The Good, The Rotten and The Misconfigured by DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp816 views
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t... by DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp294 views
We will charge you. How to [b]reach vendor’s network using EV charging station. by DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp442 views
Connect & Inspire Cyber Security by DefCamp
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp290 views
The lions and the watering hole by DefCamp
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
DefCamp225 views

Zombie browsers spiced with rootkit extensions - DefCamp 2012

  • 1. Introduction Zoltán Balázs ITSEC consultant Deloitte Hungary Instructor @NetAkademia.hu OSCP, CISSP, C|HFI, CPTS, MCP http://www.slideshare.net/bz98 Cyberlympics finals 2012 - 2nd runner up
  • 3. I love Zombie movies
  • 5. Zombies + Hacking + LOLcats = I R ZOMBIE
  • 6. Zombie browsers, spiced with rootkit extensions DefCamp 2012 • Legal disclaimer: • Every point of views and thoughts are mine. • The next presentation’s contents do not have any connection with my employers opinion, whether past, present or future. • What you will hear can be only used in test labs, and only for the good.
  • 7. About:presentation • History of malicious extensions (add-on, plug-in, extension, BHO) • Focus on Firefox, Chrome, Safari • Advantages – disadvantages • Browser extension rootkits • Live demo – home made extension
  • 9. History of malicious Firefox extensions • 90% of malicious extensions were created for Facebook spamming • 2004-2010: 5 • 2011: 5 • Jan 01, 2012 – Oct 23, 2012: 49* *Data from mozilla.org
  • 10. More examples on Facecrook Text ©f-secure
  • 11. My zombie extension • Command and Control • Stealing cookies, passwords • Uploading/downloading files (Firefox, Chrome NPAPI on todo list) • Binary execution (Firefox - Windows, Chrome NPAPI on todo list) • Geolocation
  • 18. Installing the extension Physical access Social Engineering Remote code execution – without user interaction
  • 19. Firefox rootkit 1 • Hook into other extension (even signed ones)
  • 22. Risks of a Zombie Browser •Eats your brain while you are asleep
  • 23. Risks of a Zombie Browser
  • 24. Risks of a Zombie Browser •Firewall/proxy  •Local firewall  •Application whitelisting  •Web-filtering 
  • 25. Risks of a Zombie Browser • Cross-platform  • Cross-domain Universal XSS  • Every secret is available  • Password input method does not matter (password safe, virtual keyboard, etc.) • Before SSL (+JS obfuscation) • Malicious source codes are available  • Advantage against meterpreter  • exe/dll is not needed for persistence
  • 26. Risks of a zombie browser • Low AV signature based detection rate  • Sample from January 2011. – October 2012. 0/40 • Extension vs. behavioral based detection 
  • 27. Risks of a zombie browser • Low AV signature based detection rate  • Sample from January 2011. – October 2012. 0/40 • Extension vs. behavioral based detection 
  • 28. Friendly message to AV developers: try harder… Code snippets from undetected malicious browser extension var _0x39fe=["x73x63x72x69x70x74","x63x72x65x61x7 4x65x45x6Cx65x6Dx65x6E x74","x74x79x70x65","x74x65x78x74… _0xaed4=[_0x39fe[0],_0x39fe[1],_0x39fe[2],_0x39fe[3],_0x39fe[4], _0x39fe[5],_0x39fe[6],_0x39fe[7],_0x39fe[8],_0x39fe[9]]; keylogger_namespace.keylogger… for(var x in mothership){if (mothership[x].command == "eval")
  • 31. Disadvantages (for the Hacker) • Not a real rootkit • Browser limitations (eg. portscan) • Platform limitations (eg. Execute binary code only on Windows) • Runs in user space • Runs only when browser is open • Extensions are not yet supported in: • Chrome on Android/iOS • Safari on iOS
  • 32. Gmail demo • defeat 2 step verification • Why Google? • Hacking “the others” is boring • clear text cookies • missing 2 step verification • no concurrent session detection
  • 33. Gmail demo •defeat 2 step verification
  • 34. One to rule them all • Cookie + password stealing – defeat Google 2-step verification • Use password reset on other sites linked to G-mail (Paypal, etc.) • Install any app from Google Play to victim’s Android phone • Access Android WIFI passwords • Access to Google+, Docs, Picasa, Blogger, Contacts, Web history, Checkout, Apps, OpenID • Backdooring Google account • Adding application specific password • Stealing backup codes • G-mail mail forward rule
  • 36. Chrome - distributed password hash cracking • Idea and coding by my friend and colleague, WoFF • Password hash cracking performance • Javascript: 82,000 hash/sec • Chrome native client: 840,000 hash/sec • Native code (john): 11,400,000 hash/sec
  • 37. Zombie Android •Android SQLite Journal Information Disclosure (CVE-2011-3901) •Android 2.3.7
  • 40. Browser extensions might be bad • @antivirus developers • Be reactive • The browser is the new OS • @browser developers (Mozilla) • Default deny installing extensions from 3rd-party sites • Chrome-level security • Require permissions • Extension components – separate privileges • @browser developers (Google) – keep on the good job • but disable NPAPI :)
  • 41. Browser extensions might be bad • @website developers • There is no prevention against password stealing • Cookie-stealing • Restrict session to IP (by default) • @users • Beware of malicious browser extensions • Use separated OS for e-banking and other sensitive stuff • Removing malicious extensions - create new clean profile in clean OS • @companies • Control which browsers users can use • Restrict extensions via GPO
  • 44. References • Grégoire Gentil: Hack any website, 2003 • Christophe Devaux, Julien Lenoir: Browser rootkits, 2008 • Duarte Silva: Firefox FFSpy PoC, 2008 • Andreas Grech: Stealing login details with a Google Chrome extension, 2010 • Matt Johansen, Kyle Osborn: Hacking Google ChromeOS, 2011 • Nicolas Paglieri: Attacking Web Browsers, 2012
  • 45. Browser extensions might be bad, Mmmkay??? zbalazs@deloittece.com zbalazs4 hu.linkedin.com/in/zbalazs Code released under GPL http://github.com/Z6543/ ZombieBrowserPack Greetz to @hekkcamp