Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation

Ajin Abraham
Ajin AbrahamSecurity Engineer | Freelance Security Consultant | Speaker at IMMUNIO
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
1 of 44

Recommended

Abusing, Exploiting and Pwning with Firefox Add-ons by
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAjin Abraham
8.5K views18 slides
Abusing Google Apps and Data API: Google is My Command and Control Center by
Abusing Google Apps and Data API: Google is My Command and Control CenterAbusing Google Apps and Data API: Google is My Command and Control Center
Abusing Google Apps and Data API: Google is My Command and Control CenterAjin Abraham
8.7K views24 slides
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF by
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAjin Abraham
23K views38 slides
Abusing Exploiting and Pwning with Firefox Addons by
Abusing Exploiting and Pwning with Firefox AddonsAbusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAjin Abraham
5.7K views20 slides
Shellcoding in linux by
Shellcoding in linuxShellcoding in linux
Shellcoding in linuxAjin Abraham
3.4K views15 slides
Xenotix XSS Exploit Framework: Clubhack 2012 by
Xenotix XSS Exploit Framework: Clubhack 2012 Xenotix XSS Exploit Framework: Clubhack 2012
Xenotix XSS Exploit Framework: Clubhack 2012 Ajin Abraham
3.9K views26 slides

More Related Content

Viewers also liked

Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Ajin Abraham
8K views53 slides
27 jan 2012[1] by
27 jan 2012[1]27 jan 2012[1]
27 jan 2012[1]Biblioteca Escolar Aeob
268 views1 slide
Managing Security in External Software Dependencies by
Managing Security in External Software DependenciesManaging Security in External Software Dependencies
Managing Security in External Software Dependenciesthariyarox
624 views21 slides
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation by
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentationDerrick Hunter
1.6K views15 slides
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01 by
2014 11-06-sonarqube-asfws-141110031042-conversion-gate012014 11-06-sonarqube-asfws-141110031042-conversion-gate01
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01Cyber Security Alliance
769 views23 slides
Continuous Security - TCCC by
Continuous Security - TCCCContinuous Security - TCCC
Continuous Security - TCCCWendy Istvanick
557 views43 slides

Viewers also liked(18)

Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by Ajin Abraham
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham8K views
Managing Security in External Software Dependencies by thariyarox
Managing Security in External Software DependenciesManaging Security in External Software Dependencies
Managing Security in External Software Dependencies
thariyarox624 views
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation by Derrick Hunter
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter1.6K views
Hiding in Plain Sight: The Danger of Known Vulnerabilities by Imperva
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Imperva2.8K views
Live 2014 Survey Results: Open Source Development and Application Security Su... by Sonatype
Live 2014 Survey Results: Open Source Development and Application Security Su...Live 2014 Survey Results: Open Source Development and Application Security Su...
Live 2014 Survey Results: Open Source Development and Application Security Su...
Sonatype 2K views
[Poland] SecOps live cooking with OWASP appsec tools by OWASP EEE
[Poland] SecOps live cooking with OWASP appsec tools[Poland] SecOps live cooking with OWASP appsec tools
[Poland] SecOps live cooking with OWASP appsec tools
OWASP EEE461 views
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps by Stephan Kaps
DevOpsCon 2016 - Continuous Security Testing - Stephan KapsDevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
Stephan Kaps6K views
Continuous Integration with Maven for Android apps by Hugo Josefson
Continuous Integration with Maven for Android appsContinuous Integration with Maven for Android apps
Continuous Integration with Maven for Android apps
Hugo Josefson2.9K views
Simplify Dev with Complicated Security Tools by Kevin Fealey
Simplify Dev with Complicated Security ToolsSimplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security Tools
Kevin Fealey622 views
Les principales failles de sécurité des applications web actuelles by Bee_Ware
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
Bee_Ware2.2K views
Owasp Project を使ってみた by Akitsugu Ito
Owasp Project を使ってみたOwasp Project を使ってみた
Owasp Project を使ってみた
Akitsugu Ito13.1K views
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S... by Ajin Abraham
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham10K views

More from Ajin Abraham

Injecting Security into Web apps at Runtime Whitepaper by
Injecting Security into Web apps at Runtime WhitepaperInjecting Security into Web apps at Runtime Whitepaper
Injecting Security into Web apps at Runtime WhitepaperAjin Abraham
3.1K views9 slides
Injecting Security into vulnerable web apps at Runtime by
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeAjin Abraham
3K views56 slides
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ... by
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Ajin Abraham
67K views38 slides
Automated Security Analysis of Android & iOS Applications with Mobile Securit... by
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Ajin Abraham
26.1K views24 slides
Hacking Tizen : The OS of Everything - Nullcon Goa 2015 by
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Ajin Abraham
7K views50 slides
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains by
Exploit Research and Development Megaprimer: DEP Bypassing with ROP ChainsExploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Exploit Research and Development Megaprimer: DEP Bypassing with ROP ChainsAjin Abraham
4.6K views16 slides

More from Ajin Abraham(14)

Injecting Security into Web apps at Runtime Whitepaper by Ajin Abraham
Injecting Security into Web apps at Runtime WhitepaperInjecting Security into Web apps at Runtime Whitepaper
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham3.1K views
Injecting Security into vulnerable web apps at Runtime by Ajin Abraham
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham3K views
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ... by Ajin Abraham
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham67K views
Automated Security Analysis of Android & iOS Applications with Mobile Securit... by Ajin Abraham
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham26.1K views
Hacking Tizen : The OS of Everything - Nullcon Goa 2015 by Ajin Abraham
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham7K views
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains by Ajin Abraham
Exploit Research and Development Megaprimer: DEP Bypassing with ROP ChainsExploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Ajin Abraham4.6K views
Exploit Research and Development Megaprimer: Win32 Egghunter by Ajin Abraham
Exploit Research and Development Megaprimer: Win32 EgghunterExploit Research and Development Megaprimer: Win32 Egghunter
Exploit Research and Development Megaprimer: Win32 Egghunter
Ajin Abraham3.1K views
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ... by Ajin Abraham
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Ajin Abraham5K views
Exploit Research and Development Megaprimer: Unicode Based Exploit Development by Ajin Abraham
Exploit Research and Development Megaprimer: Unicode Based Exploit DevelopmentExploit Research and Development Megaprimer: Unicode Based Exploit Development
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Ajin Abraham1.9K views
Exploit Research and Development Megaprimer: Buffer overflow for beginners by Ajin Abraham
Exploit Research and Development Megaprimer: Buffer overflow for beginnersExploit Research and Development Megaprimer: Buffer overflow for beginners
Exploit Research and Development Megaprimer: Buffer overflow for beginners
Ajin Abraham1.4K views
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013 by Ajin Abraham
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Ajin Abraham10.3K views
Wi-Fi Security with Wi-Fi P+ by Ajin Abraham
Wi-Fi Security with Wi-Fi P+Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+
Ajin Abraham2.4K views
Phishing With Data URI by Ajin Abraham
Phishing With Data URIPhishing With Data URI
Phishing With Data URI
Ajin Abraham2.3K views
Buffer overflow for Beginners by Ajin Abraham
Buffer overflow for BeginnersBuffer overflow for Beginners
Buffer overflow for Beginners
Ajin Abraham948 views

Recently uploaded

Data Integrity for Banking and Financial Services by
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
29 views26 slides
Microsoft Power Platform.pptx by
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptxUni Systems S.M.S.A.
61 views38 slides
"Node.js Development in 2024: trends and tools", Nikita Galkin by
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
17 views38 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
69 views8 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
317 views86 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
66 views46 slides

Recently uploaded(20)

Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely29 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays17 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 views
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe by Simone Puorto
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
Simone Puorto13 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker48 views