SlideShare a Scribd company logo
Submit Search
Upload
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Report
Share
Ajin Abraham
Security Engineer | Freelance Security Consultant | Speaker at IMMUNIO
Follow
•
1 like
•
3,592 views
1
of
44
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
•
1 like
•
3,592 views
Report
Share
Download Now
Download to read offline
Technology
Paper: http://keralacyberforce.in/abusing-exploiting-and-pwning-with-firefox-add-ons/
Read more
Ajin Abraham
Security Engineer | Freelance Security Consultant | Speaker at IMMUNIO
Follow
Recommended
Abusing, Exploiting and Pwning with Firefox Add-ons by
Abusing, Exploiting and Pwning with Firefox Add-ons
Ajin Abraham
8.5K views
•
18 slides
Abusing Google Apps and Data API: Google is My Command and Control Center by
Abusing Google Apps and Data API: Google is My Command and Control Center
Ajin Abraham
8.7K views
•
24 slides
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF by
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
23K views
•
38 slides
Abusing Exploiting and Pwning with Firefox Addons by
Abusing Exploiting and Pwning with Firefox Addons
Ajin Abraham
5.7K views
•
20 slides
Shellcoding in linux by
Shellcoding in linux
Ajin Abraham
3.4K views
•
15 slides
Xenotix XSS Exploit Framework: Clubhack 2012 by
Xenotix XSS Exploit Framework: Clubhack 2012
Ajin Abraham
3.9K views
•
26 slides
More Related Content
Viewers also liked
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
8K views
•
53 slides
27 jan 2012[1] by
27 jan 2012[1]
Biblioteca Escolar Aeob
268 views
•
1 slide
Managing Security in External Software Dependencies by
Managing Security in External Software Dependencies
thariyarox
624 views
•
21 slides
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation by
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
1.6K views
•
15 slides
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01 by
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01
Cyber Security Alliance
769 views
•
23 slides
Continuous Security - TCCC by
Continuous Security - TCCC
Wendy Istvanick
557 views
•
43 slides
Viewers also liked
(18)
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by Ajin Abraham
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
•
8K views
27 jan 2012[1] by Biblioteca Escolar Aeob
27 jan 2012[1]
Biblioteca Escolar Aeob
•
268 views
Managing Security in External Software Dependencies by thariyarox
Managing Security in External Software Dependencies
thariyarox
•
624 views
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation by Derrick Hunter
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
•
1.6K views
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01 by Cyber Security Alliance
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01
Cyber Security Alliance
•
769 views
Continuous Security - TCCC by Wendy Istvanick
Continuous Security - TCCC
Wendy Istvanick
•
557 views
Dependency check by David Karlsen
Dependency check
David Karlsen
•
1.1K views
Hiding in Plain Sight: The Danger of Known Vulnerabilities by Imperva
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Imperva
•
2.8K views
Live 2014 Survey Results: Open Source Development and Application Security Su... by Sonatype
Live 2014 Survey Results: Open Source Development and Application Security Su...
Sonatype
•
2K views
Managing third party libraries by n|u - The Open Security Community
Managing third party libraries
n|u - The Open Security Community
•
729 views
News Bytes - December 2015 by n|u - The Open Security Community
News Bytes - December 2015
n|u - The Open Security Community
•
657 views
[Poland] SecOps live cooking with OWASP appsec tools by OWASP EEE
[Poland] SecOps live cooking with OWASP appsec tools
OWASP EEE
•
461 views
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps by Stephan Kaps
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
Stephan Kaps
•
6K views
Continuous Integration with Maven for Android apps by Hugo Josefson
Continuous Integration with Maven for Android apps
Hugo Josefson
•
2.9K views
Simplify Dev with Complicated Security Tools by Kevin Fealey
Simplify Dev with Complicated Security Tools
Kevin Fealey
•
622 views
Les principales failles de sécurité des applications web actuelles by Bee_Ware
Les principales failles de sécurité des applications web actuelles
Bee_Ware
•
2.2K views
Owasp Project を使ってみた by Akitsugu Ito
Owasp Project を使ってみた
Akitsugu Ito
•
13.1K views
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S... by Ajin Abraham
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
•
10K views
More from Ajin Abraham
Injecting Security into Web apps at Runtime Whitepaper by
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham
3.1K views
•
9 slides
Injecting Security into vulnerable web apps at Runtime by
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
3K views
•
56 slides
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ... by
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
67K views
•
38 slides
Automated Security Analysis of Android & iOS Applications with Mobile Securit... by
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
26.1K views
•
24 slides
Hacking Tizen : The OS of Everything - Nullcon Goa 2015 by
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham
7K views
•
50 slides
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains by
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Ajin Abraham
4.6K views
•
16 slides
More from Ajin Abraham
(14)
Injecting Security into Web apps at Runtime Whitepaper by Ajin Abraham
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham
•
3.1K views
Injecting Security into vulnerable web apps at Runtime by Ajin Abraham
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
•
3K views
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ... by Ajin Abraham
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
•
67K views
Automated Security Analysis of Android & iOS Applications with Mobile Securit... by Ajin Abraham
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
•
26.1K views
Hacking Tizen : The OS of Everything - Nullcon Goa 2015 by Ajin Abraham
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham
•
7K views
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains by Ajin Abraham
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Ajin Abraham
•
4.6K views
Exploit Research and Development Megaprimer: Win32 Egghunter by Ajin Abraham
Exploit Research and Development Megaprimer: Win32 Egghunter
Ajin Abraham
•
3.1K views
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ... by Ajin Abraham
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Ajin Abraham
•
5K views
Exploit Research and Development Megaprimer: Unicode Based Exploit Development by Ajin Abraham
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Ajin Abraham
•
1.9K views
Exploit Research and Development Megaprimer: Buffer overflow for beginners by Ajin Abraham
Exploit Research and Development Megaprimer: Buffer overflow for beginners
Ajin Abraham
•
1.4K views
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013 by Ajin Abraham
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Ajin Abraham
•
10.3K views
Wi-Fi Security with Wi-Fi P+ by Ajin Abraham
Wi-Fi Security with Wi-Fi P+
Ajin Abraham
•
2.4K views
Phishing With Data URI by Ajin Abraham
Phishing With Data URI
Ajin Abraham
•
2.3K views
Buffer overflow for Beginners by Ajin Abraham
Buffer overflow for Beginners
Ajin Abraham
•
948 views
Recently uploaded
Data Integrity for Banking and Financial Services by
Data Integrity for Banking and Financial Services
Precisely
29 views
•
26 slides
Microsoft Power Platform.pptx by
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.
61 views
•
38 slides
"Node.js Development in 2024: trends and tools", Nikita Galkin by
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays
17 views
•
38 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining
69 views
•
8 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
317 views
•
86 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp
66 views
•
46 slides
Recently uploaded
(20)
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial Services
Precisely
•
29 views
Microsoft Power Platform.pptx by Uni Systems S.M.S.A.
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.
•
61 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays
•
17 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining
•
69 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
•
317 views
Ransomware is Knocking your Door_Final.pdf by Security Bootcamp
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp
•
66 views
Melek BEN MAHMOUD.pdf by MelekBenMahmoud
Melek BEN MAHMOUD.pdf
MelekBenMahmoud
•
17 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc
•
72 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld
•
27 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About Postman
Postman
•
38 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP
•
25 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdf
madhurjyapb
•
14 views
GDSC CTU First Meeting Party by National Yang Ming Chiao Tung University
GDSC CTU First Meeting Party
National Yang Ming Chiao Tung University
•
11 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum
•
43 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Digital Insurer
•
24 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays
•
24 views
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe by Simone Puorto
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
Simone Puorto
•
13 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10
•
345 views
Evolving the Network Automation Journey from Python to Platforms by Network Automation Forum
Evolving the Network Automation Journey from Python to Platforms
Network Automation Forum
•
17 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker
•
48 views