SlideShare a Scribd company logo

Exploiting Firefox Extensions

Roberto Suggi Liverani
Roberto Suggi LiveraniPentester/Reseacher
Exploiting Firefox Extensions


                                     Roberto Suggi Liverani / Nick Freeman
                                                 Security-Assessment.com




Securitybyte & OWASP Confidential
Who Are We?


                 Roberto Suggi Liverani
                   – Senior Security Consultant – Security-
                     Assessment.com
                   – OWASP NZ Leader
                   – http://malerisch.net
                 Nick Freeman
                   – Security Consultant – Security-Assessment.com
                   – http://atta.cked.me
                 Contact us
                   – Roberto.suggi@security-assessment.com
                   – Nick.freeman@security-assessment.com
Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   2
Agenda


                 Introduction

                 Security threats and risks

                 Disclosure summary

                 Exploiting Extensions – a selection of exploits
                 and demos



Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   3
Introduction


                 What are Firefox extensions?
                   – It’s just software
                   – Equivalent of ActiveX
                 What extensions do?
                   – Extend, modify and control browser behaviour
                   – Provides extended/rich functionality and added
                     features
                 Different type of Firefox addons
                   – Extensions
                   – Plugins (Search Engine plugins) and Themes


Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   4
XPConnect:
                                                                            XBL:
                                                                            Chrome:
                                                                            XUL:
                                                                            XPCOM:
                                                                             - middle layerto Extension
                                                                            - provides UIbrowser zone
                                                                             - privilegedcomponents/interfaces
                                                                             – allows creation of new widgets to
                                                                               reusable      allows JavaScript
                                                                                               extensions
                                                                                             Technology
                                                                            interface with XPCOM
                                                                            - combined with CSS, XML and XUL
                                                                             - combined with JavaScript, CSS,
                                                                             – code fully trustedlayer libraries:
                                                                               interact with low
                                                                                               Overview
                                                                             HTML elements system, etc.
                                                                             network, I/O, file
                                                                             -.xul file




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009                                     5
Extension Security Model

                 Mozilla extension security model is nonexistent
                   – Extension code is fully trusted by Firefox
                             • Vulnerability in extension code might result in full system
                               compromise
                   – No security boundaries between extensions
                             • An extension can silently modify/alter another extension
                   – XPCom C++ components subject to memory
                     corruption
                   – Extensions vulnerabilities are platform independent
                   – Lack of security policies to allow/deny Firefox
                     access to internal API, XPCom components, etc
                   – Any Mozilla application with the extension system is
                     vulnerable to same class of issues (e.g. Thunderbird)

Securitybyte & OWASP Confidential             Securitybyte & OWASP AppSec Conference 2009    6
The potential


                 Statistics – Firefox Browser Market Share
                   – Beyond 20% globally since November 2008, more
                     than 50% in certain regions/countries




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   7
Extension downloads boom


                 Statistics – AMO (Addons.Mozilla.Org) Download
                 Trend
                   – 1 billion extension downloads from AMO – Nov 2008




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   8
Extensions are everywhere


    Search engines                     Social                Services              Software/OS/We   Extensions
                                      Networks                                      b Application     Portals
                                                                                       Package

   Google Toolbar                   Del.icio.us         Netcraft Anti-            Skype             AMO (addons
   Google Browser                   Extension           Phishing                  AVG               mozilla org)
   Sync                             Facebook            Toolbar                   Ubuntu            Mozdev
   Yahoo Toolbar                    Toolbar             PhishTank                 LiveLink          Xulplanet
   Ask.com Toolbar                  AOL Toolbar         SiteChecker               (OpenText)
                                    LinkedIn
                                    Browser
                                    Toolbar




Securitybyte & OWASP Confidential                 Securitybyte & OWASP AppSec Conference 2009                      9
The weakest part of the chain


                 Human Factors - users:
                   – Trust
                             • AMO Recommended Extensions
                             • Open Source

                   – Misconception = users expect extensions to be safe
                             • 'according to Softpedia, it's 100% safe‘
                             • NoScript/AdBlockPlus provides false sense of security
                                    – chrome:// URI whitelisted on NoScript, any XSS injection
                                      there is not blocked




Securitybyte & OWASP Confidential                 Securitybyte & OWASP AppSec Conference 2009    10
The weakest part of the chain ctd.
                 Human Factors – developers:
                             • The Mozilla page for building extensions doesn't mention
                               the word 'security' once
                             • Many addon developers do it for a hobby – not necessarily
                               aware of how dangerous a vulnerable extension can be


                 Human Factors – reviewers:
                             • Don’t need to have great knowledge about app / webapp
                               security
                             • Need to follow a few guidelines for what is and isn’t
                               acceptable
                             • These guidelines focus on finding malicious extensions
                             • Vulnerable extensions can quite easily slip through




Securitybyte & OWASP Confidential            Securitybyte & OWASP AppSec Conference 2009   11
Concerns on AMO
                             • Everyone can write an extension and submit it
                             • AMO review process lacks complete security assessment




                             • Few extensions are signed in AMO. Extensions are generally
                               not “signed”. Users trust unsigned extensions.
                             • Experimental extensions (not approved yet) are publicly
                               available

Securitybyte & OWASP Confidential            Securitybyte & OWASP AppSec Conference 2009    12
Extension And Malware
                             • FormSpy - 2006
                                 – Downloader-AXM Trojan, poses as the legitimate
                                   NumberedLinks 0.9 extension
                                 – Steal passwords, credit card numbers, and e-banking
                                   login details
                             • Firestarterfox - 2008
                                 – Hijacks all search requests through multiple search
                                   engines and redirects them through Russian site
                                   thebestwebsearch.net
                             • Vietnamese Language Pack - 2008
                                 – Shipped with adware because the developer was owned
                 Might happen in the near future…
                             • Malware authors bribe/hack famous/recommended
                               extension developer/vendor
                             • Initial benign extension, malware is introduced in an 3rd/4th
                               update
Securitybyte & OWASP Confidential             Securitybyte & OWASP AppSec Conference 2009      13
Abusing Firefox Extensions


                 Finding bugs in Firefox extensions is fun ;-)
                   – Multiple ways to find them – it depends on:
                             •      Nature of the extension
                             •      Logic exposed
                             •      Input and output
                             •      XPCOM components
                             •      Third party API/components


                 Our research focus:
                   – Extension logic, security model and functions
                     exposed
                   – Extension data flow and data injection points

Securitybyte & OWASP Confidential                Securitybyte & OWASP AppSec Conference 2009   14
XSS or Cross Browser Context
                 XSS on steroids
                   – Any input rendered in the chrome is a potential XSS
                     injection point




                   – XSS in chrome is privileged code!
                             • It can interface with XPConnect and XPCOM = 0wn3d!
                             • No SOP restrictions!
                             • Cannot be blocked by NoScript!
Securitybyte & OWASP Confidential           Securitybyte & OWASP AppSec Conference 2009   15
NoScript’s Whitelist




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   16
XSS disclosing /etc/passwd




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   17
Testing for XSS

                   – Run Firefox with console active
                             • firefox.exe -console
                   – To confirm execution of our XSS payload, generate
                     an error into console – dump(error);
                   – Is our XSS in Chrome? Check all window properties -
                     not just window




Securitybyte & OWASP Confidential            Securitybyte & OWASP AppSec Conference 2009   18
Useful XSS payloads
                   – Check use of
                     nsIScriptableUnescapeHTML.parseFragment()
                             • Lack of this might mean use of input black-list filters
                 Method Description                                           Payload
             iframe with data URI            <iframe src =
             and base64 payload              ‘data:text/html;base64,base64XSSpayloadhere’>
             Recursive iframes               <iframe src = “data:text/html,<iframe src =
                                             ‘data:text/html;base64,base64iframe+data+XSSp
                                             ayload’> </iframe”></iframe>
             Embedded XSS                    <embed src=‘javascript:XSSpayload’>
             XSS on DOM events               <img src=‘a’ onerror=XSSpayload>
             XUL injection                   <![CDATA[“<button id=“1” label=“a”
                                             oncommand=‘alert(window)’ />”]]>
             XBL injection                   style=“-moz-
                                             binding:url(data:text/xml;charset=utf-8,XBL)”



Securitybyte & OWASP Confidential             Securitybyte & OWASP AppSec Conference 2009    19
Tools

                       • Firebug
                       • Chromebug – Firebug for chrome, XUL
                       • WebDeveloper – allows more control on page elements,
                         cookies
                       • XPComViewer – shows registered XPCOM
                         components/interfaces
                       • Venkman - JavaScript Debugger
                       • Console2 – advanced error console
                       • ChromeList – File viewer for installed extensions
                       • Execute JS - enhanced JavaScript-Console
                       • DOM Inspector – allows inspecting the DOM
                       • Burp – web proxy
                       • Mozrepl – js shell via telnet service
                       • Sysinternals Tools – regmon, filemon, tcpmon, etc.


Securitybyte & OWASP Confidential        Securitybyte & OWASP AppSec Conference 2009   20
Abusing extensions…
                   Extension          Date              Vendor Response                 Fix Date
                     Name           Disclosed                Date
                     WizzRSS        2009/02/18               2009/02/18                 2009/03/20
               CoolPreviews         2009/03/05         No response, silently            2009/04/20
                                                              fixed
                     FireFTP           N/A                         N/A                  2009/02/19
                      InfoRSS       2009/02/16               2009/02/16                 2009/07/03
               Feed Sidebar         2009/03/04               2009/03/05                 2009/03/14
                         Sage       2009/02/27                     N/A                     N/A
             UpdateScanner          2009/06/08               2009/06/11                 2009/06/15
                 Undisclosed        2009/06/22                     N/A                     N/A
                       Yoono        2009/06/30               2009/06/30                 2009/07/06
                   ScribeFire       2009/07/10               2009/07/15                 2009/07/20
                        Skype          N/A                         N/A                  2009/06/03


                 Total downloads from AMO: 30,000,000+
Securitybyte & OWASP Confidential         Securitybyte & OWASP AppSec Conference 2009                21
Skype


                 Skype (<=3.8.0.188)
                 Issue:
                   – Automatic arbitrary number of calls to arbitrary
                     phone numbers and skypenames
                   – Function skype_tool.call() is exposed to DOM and
                     can be called directly
                   – Skype username injection - skypeusername%00+"
                 Filtering/Protection:
                   – None.
                 Exploit:
                   – Automatic arbitrary phone call to multiple numbers
Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   22
Demo


                 Demo.avi
                 Arbitrary phone calls




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   23
CoolPreviews

                 CoolPreviews – 2.7
                 Issue:
                   – URI is passed to the CoolPreviews Stack without any
                     filtering.
                   – A data: URI is accepted and its content is rendered
                     in the chrome privileged zone.
                   – User triggers exploit by adding the malicious link to
                     the CoolPreviews stack (right-click by default)
                 Filtering/Protection:
                   – No use of URI whitelist
                 Exploit:
                   – data:text/html,base64;payloadbase64encoded
Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   24
Demo

                 Remote Code Execution Payload – invoking
                 cmd.exe




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   25
FireFTP


                 FireFTP (<1.1.4)
                 Issue:
                   – HTML and JavaScript in a server’s welcome message
                     is evaluated when connecting to an FTP server.
                   – The code is executed in the chrome privilege zone
                 Filtering/Protection:
                   – None.
                 Exploit:
                   – Local File Disclosure



Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   26
Demo

                 Local File Disclosure




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   27
Feed Sidebar
                 Feed Sidebar (<3.2)
                 Issue:
                   – HTML and JavaScript in the <description> tags of RSS
                     feeds is executed in the chrome security zone.
                   – JavaScript is encoded in base64 or used as the
                     source of an iframe and executed when the user
                     clicks on the malicious feed item.
                 Filtering/Protection:
                   – <script> tags are stripped
                 Exploit:
                   – &lt;iframe
                     src=&quot;data:text/html;base64,base64encodedjav
                     ascript&quot;&gt;&lt;/iframe&gt;
Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   28
Demo


                 Password stealing




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   29
Sage
                 Sage (<=1.4.3)
                 Issue:
                   – HTML and JavaScript in the <description> tags of RSS
                     feeds is executed in the chrome security zone.
                   – data: URI scheme injection in the <link> tag
                 Filtering/Protection:
                   – No protection
                 Exploit:
                   – <description>&lt;script&gt;dosomethingbad();&lt;scr
                     ipt&gt;</description>
                   – <link>data:text/html;base64,payload</link>


Securitybyte & OWASP Confidential    Securitybyte & OWASP AppSec Conference 2009   30
Demo

                 Compromising NoScript – whitelisting malicious
                 site




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   31
InfoRSS
                 InfoRSS(<=1.1.4.2)
                 Issue:
                   – HTML and JavaScript in the <description> tags of RSS
                     feeds is executed in the chrome security zone.
                   – JavaScript is encoded in base64 or used as the
                     source of an iframe and executed when the user
                     clicks on the malicious feed item.
                 Filtering/Protection:
                   – <script> tags are stripped
                 Exploit:
                   – &lt;iframe
                     src=&quot;data:text/html;base64,base64encodedjav
                     ascript&quot;&gt;&lt;/iframe&gt;
Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   32
Demo

                 Arbitrary Code Execution via BeEF Reloaded
                   – Support for XUL
                   – Mozilla extensions exploitation
                   – Command line option (Windows)




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   33
Yoono


                 Yoono (<6.1.1)
                 Issue:
                   – JavaScript in DOM event handlers such as onLoad is
                     evaluated in the chrome privileged browser zone.
                   – Drag & dropping a malicious image into the preview
                     window executes the JavaScript.
                 Filtering/Protection:
                   – No protection for DOM event handlers.
                 Exploit:
                   – <img src=‘http://somewebsite.tld/lolcatpicture.jpg’
                     onLoad=‘evilJavaScript’>

Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   34
Demo


                 Reverse VNC Using XHR – contents of payload




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   35
Security Disclosure


                 Security disclosure is a new process to
                 extension developers/vendors

                   – Security is underestimated/not understood.
                   – Few posts regarding security vulnerabilities in
                     Firefox extensions in sec mailing-lists as Full
                     Disclosure.
                   – Mozilla security team can now be queried for bugs
                     found in extensions.




Securitybyte & OWASP Confidential   Securitybyte & OWASP AppSec Conference 2009   36
Recommendations


                    – Developers:
                              • Follow OWASP developer’s guide
                              • Read code of similar extensions for ideas on avoiding
                                common bugs
                    – Security professionals:
                              • Adhere to the OWASP testing guide and our presentation
                              • Watch for publications for new ideas on breaking extensions
                    – End-users:
                              •     Don’t trust extensions!
                              •     Examine changelogs of security issues / Bugzilla
                              •     Update addons (after checking the above)
                              •     Consider using Safe Mode (disable all extensions)


Securitybyte & OWASP Confidential                 Securitybyte & OWASP AppSec Conference 2009   37
Thanks!
                                    Roberto.suggi@security-assessment.com
                                    Nick.freeman@security-assessment.com




Securitybyte & OWASP Confidential            Securitybyte & OWASP AppSec Conference 2009   38
References

                   – Research and publications on the topic
                             • Extensible Web Browser Security - Mike Ter Louw, Jin Soon
                               Lim, and V.N. Venkatakrishnan
                                    – http://www.mike.tl/view/Research/ExtensibleWebBrowserSe
                                      curity

                             • Bachelor thesis on Firefox extension security - Julian
                               Verdurmen
                                    – http://jverdurmen.ruhosting.nl/BachelorThesis-Firefox-
                                      extension-security.html

                             • Attacking Rich Internet Applications (kuza55, Stefano Di
                               Paola)
                                    – http://www.ruxcon.org.au/files/2008/Attacking_Rich_Intern
                                      et_Applications.pdf


Securitybyte & OWASP Confidential                Securitybyte & OWASP AppSec Conference 2009      39
References

                             • Firebug – Petko. D. Petkov, Thor Larholm, 06 april 2007
                                    – http://larholm.com/2007/04/06/0day-vulnerability-in-
                                      firebug/
                                    – http://www.gnucitizen.org/blog/firebug-goes-evil/
                             • Tamper Data XSS - Roee Hay – 27 jul 2008
                                    – http://blog.watchfire.com/wfblog/2008/07/tamper-data-
                                      cro.html
                             • GreaseMonkey – ISS – 21 Jul 2005
                                    – http://xforce.iss.net/xforce/xfdb/21453
                             • Sage RSS Reader (pdp & David Kierznowski)
                                 – http://www.gnucitizen.org/blog/cross-context-scripting-
                                   with-sage/
                             • Sage Disclosure:
                                 – https://www.mozdev.org/bugs/show_bug.cgi?id=20610


Securitybyte & OWASP Confidential                Securitybyte & OWASP AppSec Conference 2009   40
References

                   – CoolPreviews
                             • http://www.security-
                               assessment.com/files/advisories/CoolPreviews_Firefox_Ext
                               ension_Security_Advisory.pdf
                   – Update Scanner
                             • http://www.security-
                               assessment.com/files/advisories/CoolPreviews_Firefox_Ext
                               ension_Security_Advisory.pdf
                   – ScribeFire
                             • http://www.security-
                               assessment.com/files/advisories/ScribeFire_Firefox_Extensi
                               on_Privileged_Code_Injection.pdf



Securitybyte & OWASP Confidential            Securitybyte & OWASP AppSec Conference 2009    41
References

                   – Feed Sidebar
                             • http://www.security-
                               assessment.com/files/advisories/ScribeFire_Firefox_Extensi
                               on_Privileged_Code_Injection.pdf
                   – WizzRSS
                             • http://www.security-
                               assessment.com/files/advisories/WizzRSS_Firefox_Extensio
                               n_Privileged_Code_Injection.pdf




Securitybyte & OWASP Confidential            Securitybyte & OWASP AppSec Conference 2009    42
1 of 42

Exploiting Firefox Extensions

Download to read offline

Hundreds of Firefox addons are created every week. Millions of users download them. Some addons are even recommended by the Mozilla community, and users implicitly trust them. We don't trust a single one, and we will show you why. This talk details how we have abused some of the most popular and recommended Firefox addons, with previously unreleased vulnerabilities. From the Mozilla download statistics, over 15 million users are potentially affected. Demos will cover remote code execution, local file disclosure and other tailored Firefox Addon exploits. Don't panic - the Addons manager can be found under the 'Tools' tab in your Firefox menu. We expect to see a lot of people clicking the "Uninstall" button after this presentation.

Roberto Suggi Liverani
Roberto Suggi LiveraniPentester/Reseacher

Recommended

Cross Context Scripting attacks & exploitation by
Cross Context Scripting attacks & exploitationCross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationRoberto Suggi Liverani
3.5K views69 slides
Window Shopping Browser - Bug Hunting in 2012 by
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Roberto Suggi Liverani
3.1K views56 slides
Defending Against Application DoS attacks by
Defending Against Application DoS attacksDefending Against Application DoS attacks
Defending Against Application DoS attacksRoberto Suggi Liverani
5.1K views51 slides
Augmented reality in your web proxy by
Augmented reality in your web proxyAugmented reality in your web proxy
Augmented reality in your web proxyRoberto Suggi Liverani
3.3K views39 slides
I got 99 trends and a # is all of them by
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of themRoberto Suggi Liverani
5.8K views122 slides
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions by
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome ExtensionsI'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome ExtensionsKrzysztof Kotowicz
9.7K views49 slides
When you don't have 0days: client-side exploitation for the masses by
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesMichele Orru
59.9K views34 slides
Browser Exploitation Framework Tutorial by
Browser Exploitation Framework TutorialBrowser Exploitation Framework Tutorial
Browser Exploitation Framework Tutorialimlaurel2
4.5K views33 slides

More Related Content

What's hot

ZeroNights2012_BeEF_Workshop_antisnatchor by
ZeroNights2012_BeEF_Workshop_antisnatchorZeroNights2012_BeEF_Workshop_antisnatchor
ZeroNights2012_BeEF_Workshop_antisnatchorMichele Orru
2.4K views44 slides
Owasp AppSecEU 2015 - BeEF Session by
Owasp AppSecEU 2015 - BeEF SessionOwasp AppSecEU 2015 - BeEF Session
Owasp AppSecEU 2015 - BeEF SessionBart Leppens
5.7K views71 slides
The Future of Firefox and JavaScript by
The Future of Firefox and JavaScriptThe Future of Firefox and JavaScript
The Future of Firefox and JavaScriptjeresig
4.4K views19 slides
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1... by
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...Frédéric Harper
5.1K views56 slides
Bug Bounty Hunter Methodology - Nullcon 2016 by
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016bugcrowd
12.3K views82 slides
Neat tricks to bypass CSRF-protection by
Neat tricks to bypass CSRF-protectionNeat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protectionMikhail Egorov
17.6K views38 slides
Serverless Security: Defence Against the Dark Arts by
Serverless Security: Defence Against the Dark ArtsServerless Security: Defence Against the Dark Arts
Serverless Security: Defence Against the Dark ArtsYan Cui
292 views173 slides
Web-servers & Application Hacking by
Web-servers & Application HackingWeb-servers & Application Hacking
Web-servers & Application HackingRaghav Bisht
22.7K views293 slides
Flashack by
FlashackFlashack
Flashackn|u - The Open Security Community
2.4K views19 slides
Secuirty News Bytes-Bangalore may 2014 by
Secuirty News Bytes-Bangalore may 2014 Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014 n|u - The Open Security Community
1.8K views14 slides
Browser exploit framework by
Browser exploit frameworkBrowser exploit framework
Browser exploit frameworkPrashanth Sivarajan
960 views13 slides
Continuous intrusion: Why CI tools are an attacker’s best friends by
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsNikhil Mittal
1.8K views65 slides
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp... by
BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...BlueHat Security Conference
587 views46 slides
I'm the butcher would you like some BeEF by
I'm the butcher would you like some BeEFI'm the butcher would you like some BeEF
I'm the butcher would you like some BeEFMichele Orru
2.7K views33 slides
Dark Fairytales from a Phisherman (Vol. II) by
Dark Fairytales from a Phisherman (Vol. II)Dark Fairytales from a Phisherman (Vol. II)
Dark Fairytales from a Phisherman (Vol. II)Michele Orru
2.7K views52 slides
Introducing OWASP OWTF Workshop BruCon 2012 by
Introducing OWASP OWTF Workshop BruCon 2012Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012Abraham Aranguren
6.4K views165 slides
TakeDownCon Rocket City: WebShells by Adrian Crenshaw by
TakeDownCon Rocket City: WebShells by Adrian CrenshawTakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian CrenshawEC-Council
13.4K views45 slides
TriplePlay-WebAppPenTestingTools by
TriplePlay-WebAppPenTestingToolsTriplePlay-WebAppPenTestingTools
TriplePlay-WebAppPenTestingToolsYury Chemerkin
807 views44 slides
Anatomy of PHP Shells by
Anatomy of PHP ShellsAnatomy of PHP Shells
Anatomy of PHP ShellsVedran Krivokuca
3.3K views39 slides
Attacker Ghost Stories - ShmooCon 2014 by
Attacker Ghost Stories - ShmooCon 2014Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014Rob Fuller
43K views58 slides

What's hot (20)

ZeroNights2012_BeEF_Workshop_antisnatchor by Michele Orru
ZeroNights2012_BeEF_Workshop_antisnatchorZeroNights2012_BeEF_Workshop_antisnatchor
ZeroNights2012_BeEF_Workshop_antisnatchor
Michele Orru2.4K views
Owasp AppSecEU 2015 - BeEF Session by Bart Leppens
Owasp AppSecEU 2015 - BeEF SessionOwasp AppSecEU 2015 - BeEF Session
Owasp AppSecEU 2015 - BeEF Session
Bart Leppens5.7K views
The Future of Firefox and JavaScript by jeresig
The Future of Firefox and JavaScriptThe Future of Firefox and JavaScript
The Future of Firefox and JavaScript
jeresig4.4K views
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1... by Frédéric Harper
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...
Frédéric Harper5.1K views
Bug Bounty Hunter Methodology - Nullcon 2016 by bugcrowd
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd12.3K views
Neat tricks to bypass CSRF-protection by Mikhail Egorov
Neat tricks to bypass CSRF-protectionNeat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protection
Mikhail Egorov17.6K views
Serverless Security: Defence Against the Dark Arts by Yan Cui
Serverless Security: Defence Against the Dark ArtsServerless Security: Defence Against the Dark Arts
Serverless Security: Defence Against the Dark Arts
Yan Cui292 views
Web-servers & Application Hacking by Raghav Bisht
Web-servers & Application HackingWeb-servers & Application Hacking
Web-servers & Application Hacking
Raghav Bisht22.7K views
Continuous intrusion: Why CI tools are an attacker’s best friends by Nikhil Mittal
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friends
Nikhil Mittal1.8K views
I'm the butcher would you like some BeEF by Michele Orru
I'm the butcher would you like some BeEFI'm the butcher would you like some BeEF
I'm the butcher would you like some BeEF
Michele Orru2.7K views
Dark Fairytales from a Phisherman (Vol. II) by Michele Orru
Dark Fairytales from a Phisherman (Vol. II)Dark Fairytales from a Phisherman (Vol. II)
Dark Fairytales from a Phisherman (Vol. II)
Michele Orru2.7K views
Introducing OWASP OWTF Workshop BruCon 2012 by Abraham Aranguren
Introducing OWASP OWTF Workshop BruCon 2012Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012
Abraham Aranguren6.4K views
TakeDownCon Rocket City: WebShells by Adrian Crenshaw by EC-Council
TakeDownCon Rocket City: WebShells by Adrian CrenshawTakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
EC-Council13.4K views
TriplePlay-WebAppPenTestingTools by Yury Chemerkin
TriplePlay-WebAppPenTestingToolsTriplePlay-WebAppPenTestingTools
TriplePlay-WebAppPenTestingTools
Yury Chemerkin807 views
Attacker Ghost Stories - ShmooCon 2014 by Rob Fuller
Attacker Ghost Stories - ShmooCon 2014Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014
Rob Fuller43K views

Viewers also liked

Reversing JavaScript by
Reversing JavaScriptReversing JavaScript
Reversing JavaScriptRoberto Suggi Liverani
2.9K views48 slides
Bridging the gap - Security and Software Testing by
Bridging the gap - Security and Software TestingBridging the gap - Security and Software Testing
Bridging the gap - Security and Software TestingRoberto Suggi Liverani
1.2K views31 slides
XPath Injection by
XPath InjectionXPath Injection
XPath InjectionRoberto Suggi Liverani
7.1K views23 slides
Ajax Security by
Ajax SecurityAjax Security
Ajax SecurityRoberto Suggi Liverani
2K views33 slides
State of Web Security RailsConf 2016 by
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016IMMUNIO
664 views43 slides
Asegúr@IT IV - Remote File Downloading by
Asegúr@IT IV - Remote File DownloadingAsegúr@IT IV - Remote File Downloading
Asegúr@IT IV - Remote File DownloadingChema Alonso
1.4K views22 slides
Let's creating your own PHP (tejimaya version) by
Let's creating your own PHP (tejimaya version)Let's creating your own PHP (tejimaya version)
Let's creating your own PHP (tejimaya version)Kousuke Ebihara
1.5K views41 slides
Bug Hunting Safari by
Bug Hunting SafariBug Hunting Safari
Bug Hunting SafariJanie Clayton
1K views36 slides
Web Spam Techniques by
Web Spam TechniquesWeb Spam Techniques
Web Spam TechniquesRoberto Suggi Liverani
78.8K views53 slides
Black Energy18 - Russian botnet package analysis by
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisRoberto Suggi Liverani
1.8K views48 slides
Xml external entities [xxe] by
Xml external entities [xxe]Xml external entities [xxe]
Xml external entities [xxe]mattymcfatty
1.6K views13 slides
Philip Hung Cao - Cloud security, the journey has begun by
Philip Hung Cao - Cloud security, the journey has begunPhilip Hung Cao - Cloud security, the journey has begun
Philip Hung Cao - Cloud security, the journey has begunSecurity Bootcamp
711 views29 slides
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application by
Nguyen Phuong Truong Anh  - Some new vulnerabilities in modern web applicationNguyen Phuong Truong Anh  - Some new vulnerabilities in modern web application
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web applicationSecurity Bootcamp
1.4K views63 slides
Million Browser Botnet by
Million Browser BotnetMillion Browser Botnet
Million Browser BotnetJeremiah Grossman
6.9K views50 slides
15 Years of Web Security: The Rebellious Teenage Years by
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
2.6K views29 slides
110864103 adventures-in-bug-hunting by
110864103 adventures-in-bug-hunting110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-huntingbob dobbs
629 views192 slides
Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc... by
Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc...Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc...
Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc...Security Bootcamp
872 views9 slides
Richard Johnson, high performance fuzzing by
Richard Johnson, high performance fuzzingRichard Johnson, high performance fuzzing
Richard Johnson, high performance fuzzingPacSecJP
2.3K views48 slides
XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with... by
XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with...XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with...
XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with...Kousuke Ebihara
21.9K views91 slides
Trần Anh Khoa - Kautilya và Powershell trong kỹ thuật tấn công tiếp cận by
Trần Anh Khoa - Kautilya và Powershelltrong kỹ thuật tấn công tiếp cậnTrần Anh Khoa - Kautilya và Powershelltrong kỹ thuật tấn công tiếp cận
Trần Anh Khoa - Kautilya và Powershell trong kỹ thuật tấn công tiếp cậnSecurity Bootcamp
799 views56 slides

Viewers also liked (20)

State of Web Security RailsConf 2016 by IMMUNIO
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
IMMUNIO664 views
Asegúr@IT IV - Remote File Downloading by Chema Alonso
Asegúr@IT IV - Remote File DownloadingAsegúr@IT IV - Remote File Downloading
Asegúr@IT IV - Remote File Downloading
Chema Alonso1.4K views
Let's creating your own PHP (tejimaya version) by Kousuke Ebihara
Let's creating your own PHP (tejimaya version)Let's creating your own PHP (tejimaya version)
Let's creating your own PHP (tejimaya version)
Kousuke Ebihara1.5K views
Xml external entities [xxe] by mattymcfatty
Xml external entities [xxe]Xml external entities [xxe]
Xml external entities [xxe]
mattymcfatty1.6K views
Philip Hung Cao - Cloud security, the journey has begun by Security Bootcamp
Philip Hung Cao - Cloud security, the journey has begunPhilip Hung Cao - Cloud security, the journey has begun
Philip Hung Cao - Cloud security, the journey has begun
Security Bootcamp711 views
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application by Security Bootcamp
Nguyen Phuong Truong Anh  - Some new vulnerabilities in modern web applicationNguyen Phuong Truong Anh  - Some new vulnerabilities in modern web application
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
Security Bootcamp1.4K views
15 Years of Web Security: The Rebellious Teenage Years by Jeremiah Grossman
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
Jeremiah Grossman2.6K views
110864103 adventures-in-bug-hunting by bob dobbs
110864103 adventures-in-bug-hunting110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting
bob dobbs629 views
Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc... by Security Bootcamp
Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc...Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc...
Pham Ngọc Bắc - An toàn thông tin dưới góc nhìn Quản lý theo tiêu chuẩn Quốc...
Security Bootcamp872 views
Richard Johnson, high performance fuzzing by PacSecJP
Richard Johnson, high performance fuzzingRichard Johnson, high performance fuzzing
Richard Johnson, high performance fuzzing
PacSecJP2.3K views
XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with... by Kousuke Ebihara
XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with...XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with...
XML と PHP のイケナイ関係 (セキュリティ的な意味で) -Introduction of XXE attack and XML Bomb with...
Kousuke Ebihara21.9K views
Trần Anh Khoa - Kautilya và Powershell trong kỹ thuật tấn công tiếp cận by Security Bootcamp
Trần Anh Khoa - Kautilya và Powershelltrong kỹ thuật tấn công tiếp cậnTrần Anh Khoa - Kautilya và Powershelltrong kỹ thuật tấn công tiếp cận
Trần Anh Khoa - Kautilya và Powershell trong kỹ thuật tấn công tiếp cận
Security Bootcamp799 views

Similar to Exploiting Firefox Extensions

Trabajo de jose by
Trabajo de jose Trabajo de jose
Trabajo de jose josemgg
151 views17 slides
Browsers . by
Browsers .Browsers .
Browsers .seripa3
148 views31 slides
Internet browsers by Andres Haydar by
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres HaydarAndresHaydar
377 views17 slides
Browsers by
BrowsersBrowsers
BrowsersSebastian Lora
148 views29 slides
Browsers by
BrowsersBrowsers
BrowsersSebastian Lora
317 views29 slides
Browsers by
BrowsersBrowsers
BrowsersSebastian Lora
176 views29 slides
Web browsers by
Web browsersWeb browsers
Web browserscarlos19995
1.3K views15 slides
Web browsers by
Web browsersWeb browsers
Web browserscarlos19995
210 views15 slides
Mozilla Jetpack SDK - LinuxTag 2010 by
Mozilla Jetpack SDK - LinuxTag 2010Mozilla Jetpack SDK - LinuxTag 2010
Mozilla Jetpack SDK - LinuxTag 2010Brian King
671 views18 slides
Mozilla In Malaysia by
Mozilla In MalaysiaMozilla In Malaysia
Mozilla In MalaysiaGen Kanai
1.2K views42 slides
Surfing of the internet by
Surfing of the internetSurfing of the internet
Surfing of the internetMaria Camila Garcia
523 views27 slides
Surfing of the internet by
Surfing of the internetSurfing of the internet
Surfing of the internetMaria Camila Garcia
249 views27 slides
Abusing, Exploiting and Pwning with Firefox Add-ons by
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAjin Abraham
8.5K views18 slides
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons by
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Onsachettih
273 views18 slides
Web browsertico by
Web browserticoWeb browsertico
Web browserticotico3195
449 views18 slides
WS-* Specifications Update 2007 by
WS-* Specifications Update 2007WS-* Specifications Update 2007
WS-* Specifications Update 2007Jorgen Thelin
807 views28 slides
Web browsers by
Web browsersWeb browsers
Web browsersJorge Enrrique Vergara Salgado
384 views17 slides
Web browsers by
Web browsersWeb browsers
Web browsersJorge Enrrique Vergara Salgado
14.4K views17 slides
Flex and .NET Integration by
Flex and .NET IntegrationFlex and .NET Integration
Flex and .NET Integrationicaraion
790 views27 slides
What's new in web standards? by
What's new in web standards?What's new in web standards?
What's new in web standards?Daniel Appelquist
1.4K views17 slides

Similar to Exploiting Firefox Extensions (20)

Trabajo de jose by josemgg
Trabajo de jose Trabajo de jose
Trabajo de jose
josemgg151 views
Browsers . by seripa3
Browsers .Browsers .
Browsers .
seripa3148 views
Internet browsers by Andres Haydar by AndresHaydar
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres Haydar
AndresHaydar377 views
Mozilla Jetpack SDK - LinuxTag 2010 by Brian King
Mozilla Jetpack SDK - LinuxTag 2010Mozilla Jetpack SDK - LinuxTag 2010
Mozilla Jetpack SDK - LinuxTag 2010
Brian King671 views
Mozilla In Malaysia by Gen Kanai
Mozilla In MalaysiaMozilla In Malaysia
Mozilla In Malaysia
Gen Kanai1.2K views
Abusing, Exploiting and Pwning with Firefox Add-ons by Ajin Abraham
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-ons
Ajin Abraham8.5K views
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons by achettih
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
achettih273 views
Web browsertico by tico3195
Web browserticoWeb browsertico
Web browsertico
tico3195449 views
WS-* Specifications Update 2007 by Jorgen Thelin
WS-* Specifications Update 2007WS-* Specifications Update 2007
WS-* Specifications Update 2007
Jorgen Thelin807 views
Flex and .NET Integration by icaraion
Flex and .NET IntegrationFlex and .NET Integration
Flex and .NET Integration
icaraion790 views

Recently uploaded

Choosing the Right Flutter App Development Company by
Choosing the Right Flutter App Development CompanyChoosing the Right Flutter App Development Company
Choosing the Right Flutter App Development CompanyFicode Technologies
19 views9 slides
Initiating and Advancing Your Strategic GIS Governance Strategy by
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance StrategySafe Software
280 views68 slides
Measurecamp Brussels - Synthetic data.pdf by
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdfHuman37
34 views14 slides
Data Mesh using Microsoft Fabric by
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricNathan Bijnens
76 views32 slides
Measuring User on the web with the core web vitals - by @theafolayan.pptx by
Measuring User on the web with the core web vitals - by @theafolayan.pptxMeasuring User on the web with the core web vitals - by @theafolayan.pptx
Measuring User on the web with the core web vitals - by @theafolayan.pptxOluwaseun Raphael Afolayan
15 views13 slides
Elevating Event-Driven World: A Deep Dive into AsyncAPI v3 by
Elevating Event-Driven World: A Deep Dive into AsyncAPI v3Elevating Event-Driven World: A Deep Dive into AsyncAPI v3
Elevating Event-Driven World: A Deep Dive into AsyncAPI v3Postman
19 views32 slides
Xavier M Culmination Presenetation Final 12-7.pptx by
Xavier M Culmination Presenetation Final 12-7.pptxXavier M Culmination Presenetation Final 12-7.pptx
Xavier M Culmination Presenetation Final 12-7.pptxmanzanaresxavier28
43 views10 slides
CyberSecurity Study Jam by
CyberSecurity Study JamCyberSecurity Study Jam
CyberSecurity Study JamSahilSingh368445
625 views14 slides
Show and tell: What’s in your tech stack? - Tech Forum 2023 by
Show and tell: What’s in your tech stack? - Tech Forum 2023Show and tell: What’s in your tech stack? - Tech Forum 2023
Show and tell: What’s in your tech stack? - Tech Forum 2023BookNet Canada
40 views78 slides
Building Learning to Rank (LTR) search reranking models using Large Language ... by
Building Learning to Rank (LTR) search reranking models using Large Language ...Building Learning to Rank (LTR) search reranking models using Large Language ...
Building Learning to Rank (LTR) search reranking models using Large Language ...Sujit Pal
53 views35 slides
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
166 views12 slides
The Mysterious Paradigm of Fuzzing by Rakesh Seal by
The Mysterious Paradigm of Fuzzing by Rakesh SealThe Mysterious Paradigm of Fuzzing by Rakesh Seal
The Mysterious Paradigm of Fuzzing by Rakesh Sealnull - The Open Security Community
20 views11 slides
Modern Database Best Practices by
Modern Database Best PracticesModern Database Best Practices
Modern Database Best PracticesAll Things Open
40 views55 slides
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...BookNet Canada
58 views16 slides
Qualifying SaaS, IaaS.pptx by
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptxSachin Bhandari
1.2K views8 slides
The Role of Patterns in the Era of Large Language Models by
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
134 views65 slides
Everything You Always Wanted to Know About AsyncAPI by
Everything You Always Wanted to Know About AsyncAPIEverything You Always Wanted to Know About AsyncAPI
Everything You Always Wanted to Know About AsyncAPIPostman
17 views25 slides
Mobile Core Solutions & Successful Cases.pdf by
Mobile Core Solutions & Successful Cases.pdfMobile Core Solutions & Successful Cases.pdf
Mobile Core Solutions & Successful Cases.pdfIPLOOK Networks
20 views7 slides
Business Analyst Series 2023 - Week 5 Session 9 by
Business Analyst Series 2023 -  Week 5 Session 9Business Analyst Series 2023 -  Week 5 Session 9
Business Analyst Series 2023 - Week 5 Session 9DianaGray10
109 views13 slides
CryptoBotsAI by
CryptoBotsAICryptoBotsAI
CryptoBotsAIchandureddyvadala199
48 views5 slides

Recently uploaded (20)

Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software280 views
Measurecamp Brussels - Synthetic data.pdf by Human37
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdf
Human37 34 views
Data Mesh using Microsoft Fabric by Nathan Bijnens
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft Fabric
Nathan Bijnens76 views
Elevating Event-Driven World: A Deep Dive into AsyncAPI v3 by Postman
Elevating Event-Driven World: A Deep Dive into AsyncAPI v3Elevating Event-Driven World: A Deep Dive into AsyncAPI v3
Elevating Event-Driven World: A Deep Dive into AsyncAPI v3
Postman19 views
Xavier M Culmination Presenetation Final 12-7.pptx by manzanaresxavier28
Xavier M Culmination Presenetation Final 12-7.pptxXavier M Culmination Presenetation Final 12-7.pptx
Xavier M Culmination Presenetation Final 12-7.pptx
Show and tell: What’s in your tech stack? - Tech Forum 2023 by BookNet Canada
Show and tell: What’s in your tech stack? - Tech Forum 2023Show and tell: What’s in your tech stack? - Tech Forum 2023
Show and tell: What’s in your tech stack? - Tech Forum 2023
BookNet Canada40 views
Building Learning to Rank (LTR) search reranking models using Large Language ... by Sujit Pal
Building Learning to Rank (LTR) search reranking models using Large Language ...Building Learning to Rank (LTR) search reranking models using Large Language ...
Building Learning to Rank (LTR) search reranking models using Large Language ...
Sujit Pal53 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue166 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada58 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li134 views
Everything You Always Wanted to Know About AsyncAPI by Postman
Everything You Always Wanted to Know About AsyncAPIEverything You Always Wanted to Know About AsyncAPI
Everything You Always Wanted to Know About AsyncAPI
Postman17 views
Mobile Core Solutions & Successful Cases.pdf by IPLOOK Networks
Mobile Core Solutions & Successful Cases.pdfMobile Core Solutions & Successful Cases.pdf
Mobile Core Solutions & Successful Cases.pdf
IPLOOK Networks20 views
Business Analyst Series 2023 - Week 5 Session 9 by DianaGray10
Business Analyst Series 2023 -  Week 5 Session 9Business Analyst Series 2023 -  Week 5 Session 9
Business Analyst Series 2023 - Week 5 Session 9
DianaGray10109 views

Exploiting Firefox Extensions

  • 1. Exploiting Firefox Extensions Roberto Suggi Liverani / Nick Freeman Security-Assessment.com Securitybyte & OWASP Confidential
  • 2. Who Are We? Roberto Suggi Liverani – Senior Security Consultant – Security- Assessment.com – OWASP NZ Leader – http://malerisch.net Nick Freeman – Security Consultant – Security-Assessment.com – http://atta.cked.me Contact us – Roberto.suggi@security-assessment.com – Nick.freeman@security-assessment.com Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 2
  • 3. Agenda Introduction Security threats and risks Disclosure summary Exploiting Extensions – a selection of exploits and demos Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 3
  • 4. Introduction What are Firefox extensions? – It’s just software – Equivalent of ActiveX What extensions do? – Extend, modify and control browser behaviour – Provides extended/rich functionality and added features Different type of Firefox addons – Extensions – Plugins (Search Engine plugins) and Themes Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 4
  • 5. XPConnect: XBL: Chrome: XUL: XPCOM: - middle layerto Extension - provides UIbrowser zone - privilegedcomponents/interfaces – allows creation of new widgets to reusable allows JavaScript extensions Technology interface with XPCOM - combined with CSS, XML and XUL - combined with JavaScript, CSS, – code fully trustedlayer libraries: interact with low Overview HTML elements system, etc. network, I/O, file -.xul file Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 5
  • 6. Extension Security Model Mozilla extension security model is nonexistent – Extension code is fully trusted by Firefox • Vulnerability in extension code might result in full system compromise – No security boundaries between extensions • An extension can silently modify/alter another extension – XPCom C++ components subject to memory corruption – Extensions vulnerabilities are platform independent – Lack of security policies to allow/deny Firefox access to internal API, XPCom components, etc – Any Mozilla application with the extension system is vulnerable to same class of issues (e.g. Thunderbird) Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 6
  • 7. The potential Statistics – Firefox Browser Market Share – Beyond 20% globally since November 2008, more than 50% in certain regions/countries Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 7
  • 8. Extension downloads boom Statistics – AMO (Addons.Mozilla.Org) Download Trend – 1 billion extension downloads from AMO – Nov 2008 Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 8
  • 9. Extensions are everywhere Search engines Social Services Software/OS/We Extensions Networks b Application Portals Package Google Toolbar Del.icio.us Netcraft Anti- Skype AMO (addons Google Browser Extension Phishing AVG mozilla org) Sync Facebook Toolbar Ubuntu Mozdev Yahoo Toolbar Toolbar PhishTank LiveLink Xulplanet Ask.com Toolbar AOL Toolbar SiteChecker (OpenText) LinkedIn Browser Toolbar Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 9
  • 10. The weakest part of the chain Human Factors - users: – Trust • AMO Recommended Extensions • Open Source – Misconception = users expect extensions to be safe • 'according to Softpedia, it's 100% safe‘ • NoScript/AdBlockPlus provides false sense of security – chrome:// URI whitelisted on NoScript, any XSS injection there is not blocked Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 10
  • 11. The weakest part of the chain ctd. Human Factors – developers: • The Mozilla page for building extensions doesn't mention the word 'security' once • Many addon developers do it for a hobby – not necessarily aware of how dangerous a vulnerable extension can be Human Factors – reviewers: • Don’t need to have great knowledge about app / webapp security • Need to follow a few guidelines for what is and isn’t acceptable • These guidelines focus on finding malicious extensions • Vulnerable extensions can quite easily slip through Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 11
  • 12. Concerns on AMO • Everyone can write an extension and submit it • AMO review process lacks complete security assessment • Few extensions are signed in AMO. Extensions are generally not “signed”. Users trust unsigned extensions. • Experimental extensions (not approved yet) are publicly available Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 12
  • 13. Extension And Malware • FormSpy - 2006 – Downloader-AXM Trojan, poses as the legitimate NumberedLinks 0.9 extension – Steal passwords, credit card numbers, and e-banking login details • Firestarterfox - 2008 – Hijacks all search requests through multiple search engines and redirects them through Russian site thebestwebsearch.net • Vietnamese Language Pack - 2008 – Shipped with adware because the developer was owned Might happen in the near future… • Malware authors bribe/hack famous/recommended extension developer/vendor • Initial benign extension, malware is introduced in an 3rd/4th update Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 13
  • 14. Abusing Firefox Extensions Finding bugs in Firefox extensions is fun ;-) – Multiple ways to find them – it depends on: • Nature of the extension • Logic exposed • Input and output • XPCOM components • Third party API/components Our research focus: – Extension logic, security model and functions exposed – Extension data flow and data injection points Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 14
  • 15. XSS or Cross Browser Context XSS on steroids – Any input rendered in the chrome is a potential XSS injection point – XSS in chrome is privileged code! • It can interface with XPConnect and XPCOM = 0wn3d! • No SOP restrictions! • Cannot be blocked by NoScript! Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 15
  • 16. NoScript’s Whitelist Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 16
  • 17. XSS disclosing /etc/passwd Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 17
  • 18. Testing for XSS – Run Firefox with console active • firefox.exe -console – To confirm execution of our XSS payload, generate an error into console – dump(error); – Is our XSS in Chrome? Check all window properties - not just window Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 18
  • 19. Useful XSS payloads – Check use of nsIScriptableUnescapeHTML.parseFragment() • Lack of this might mean use of input black-list filters Method Description Payload iframe with data URI <iframe src = and base64 payload ‘data:text/html;base64,base64XSSpayloadhere’> Recursive iframes <iframe src = “data:text/html,<iframe src = ‘data:text/html;base64,base64iframe+data+XSSp ayload’> </iframe”></iframe> Embedded XSS <embed src=‘javascript:XSSpayload’> XSS on DOM events <img src=‘a’ onerror=XSSpayload> XUL injection <![CDATA[“<button id=“1” label=“a” oncommand=‘alert(window)’ />”]]> XBL injection style=“-moz- binding:url(data:text/xml;charset=utf-8,XBL)” Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 19
  • 20. Tools • Firebug • Chromebug – Firebug for chrome, XUL • WebDeveloper – allows more control on page elements, cookies • XPComViewer – shows registered XPCOM components/interfaces • Venkman - JavaScript Debugger • Console2 – advanced error console • ChromeList – File viewer for installed extensions • Execute JS - enhanced JavaScript-Console • DOM Inspector – allows inspecting the DOM • Burp – web proxy • Mozrepl – js shell via telnet service • Sysinternals Tools – regmon, filemon, tcpmon, etc. Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 20
  • 21. Abusing extensions… Extension Date Vendor Response Fix Date Name Disclosed Date WizzRSS 2009/02/18 2009/02/18 2009/03/20 CoolPreviews 2009/03/05 No response, silently 2009/04/20 fixed FireFTP N/A N/A 2009/02/19 InfoRSS 2009/02/16 2009/02/16 2009/07/03 Feed Sidebar 2009/03/04 2009/03/05 2009/03/14 Sage 2009/02/27 N/A N/A UpdateScanner 2009/06/08 2009/06/11 2009/06/15 Undisclosed 2009/06/22 N/A N/A Yoono 2009/06/30 2009/06/30 2009/07/06 ScribeFire 2009/07/10 2009/07/15 2009/07/20 Skype N/A N/A 2009/06/03 Total downloads from AMO: 30,000,000+ Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 21
  • 22. Skype Skype (<=3.8.0.188) Issue: – Automatic arbitrary number of calls to arbitrary phone numbers and skypenames – Function skype_tool.call() is exposed to DOM and can be called directly – Skype username injection - skypeusername%00+" Filtering/Protection: – None. Exploit: – Automatic arbitrary phone call to multiple numbers Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 22
  • 23. Demo Demo.avi Arbitrary phone calls Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 23
  • 24. CoolPreviews CoolPreviews – 2.7 Issue: – URI is passed to the CoolPreviews Stack without any filtering. – A data: URI is accepted and its content is rendered in the chrome privileged zone. – User triggers exploit by adding the malicious link to the CoolPreviews stack (right-click by default) Filtering/Protection: – No use of URI whitelist Exploit: – data:text/html,base64;payloadbase64encoded Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 24
  • 25. Demo Remote Code Execution Payload – invoking cmd.exe Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 25
  • 26. FireFTP FireFTP (<1.1.4) Issue: – HTML and JavaScript in a server’s welcome message is evaluated when connecting to an FTP server. – The code is executed in the chrome privilege zone Filtering/Protection: – None. Exploit: – Local File Disclosure Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 26
  • 27. Demo Local File Disclosure Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 27
  • 28. Feed Sidebar Feed Sidebar (<3.2) Issue: – HTML and JavaScript in the <description> tags of RSS feeds is executed in the chrome security zone. – JavaScript is encoded in base64 or used as the source of an iframe and executed when the user clicks on the malicious feed item. Filtering/Protection: – <script> tags are stripped Exploit: – &lt;iframe src=&quot;data:text/html;base64,base64encodedjav ascript&quot;&gt;&lt;/iframe&gt; Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 28
  • 29. Demo Password stealing Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 29
  • 30. Sage Sage (<=1.4.3) Issue: – HTML and JavaScript in the <description> tags of RSS feeds is executed in the chrome security zone. – data: URI scheme injection in the <link> tag Filtering/Protection: – No protection Exploit: – <description>&lt;script&gt;dosomethingbad();&lt;scr ipt&gt;</description> – <link>data:text/html;base64,payload</link> Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 30
  • 31. Demo Compromising NoScript – whitelisting malicious site Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 31
  • 32. InfoRSS InfoRSS(<=1.1.4.2) Issue: – HTML and JavaScript in the <description> tags of RSS feeds is executed in the chrome security zone. – JavaScript is encoded in base64 or used as the source of an iframe and executed when the user clicks on the malicious feed item. Filtering/Protection: – <script> tags are stripped Exploit: – &lt;iframe src=&quot;data:text/html;base64,base64encodedjav ascript&quot;&gt;&lt;/iframe&gt; Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 32
  • 33. Demo Arbitrary Code Execution via BeEF Reloaded – Support for XUL – Mozilla extensions exploitation – Command line option (Windows) Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 33
  • 34. Yoono Yoono (<6.1.1) Issue: – JavaScript in DOM event handlers such as onLoad is evaluated in the chrome privileged browser zone. – Drag & dropping a malicious image into the preview window executes the JavaScript. Filtering/Protection: – No protection for DOM event handlers. Exploit: – <img src=‘http://somewebsite.tld/lolcatpicture.jpg’ onLoad=‘evilJavaScript’> Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 34
  • 35. Demo Reverse VNC Using XHR – contents of payload Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 35
  • 36. Security Disclosure Security disclosure is a new process to extension developers/vendors – Security is underestimated/not understood. – Few posts regarding security vulnerabilities in Firefox extensions in sec mailing-lists as Full Disclosure. – Mozilla security team can now be queried for bugs found in extensions. Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 36
  • 37. Recommendations – Developers: • Follow OWASP developer’s guide • Read code of similar extensions for ideas on avoiding common bugs – Security professionals: • Adhere to the OWASP testing guide and our presentation • Watch for publications for new ideas on breaking extensions – End-users: • Don’t trust extensions! • Examine changelogs of security issues / Bugzilla • Update addons (after checking the above) • Consider using Safe Mode (disable all extensions) Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 37
  • 38. Thanks! Roberto.suggi@security-assessment.com Nick.freeman@security-assessment.com Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 38
  • 39. References – Research and publications on the topic • Extensible Web Browser Security - Mike Ter Louw, Jin Soon Lim, and V.N. Venkatakrishnan – http://www.mike.tl/view/Research/ExtensibleWebBrowserSe curity • Bachelor thesis on Firefox extension security - Julian Verdurmen – http://jverdurmen.ruhosting.nl/BachelorThesis-Firefox- extension-security.html • Attacking Rich Internet Applications (kuza55, Stefano Di Paola) – http://www.ruxcon.org.au/files/2008/Attacking_Rich_Intern et_Applications.pdf Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 39
  • 40. References • Firebug – Petko. D. Petkov, Thor Larholm, 06 april 2007 – http://larholm.com/2007/04/06/0day-vulnerability-in- firebug/ – http://www.gnucitizen.org/blog/firebug-goes-evil/ • Tamper Data XSS - Roee Hay – 27 jul 2008 – http://blog.watchfire.com/wfblog/2008/07/tamper-data- cro.html • GreaseMonkey – ISS – 21 Jul 2005 – http://xforce.iss.net/xforce/xfdb/21453 • Sage RSS Reader (pdp & David Kierznowski) – http://www.gnucitizen.org/blog/cross-context-scripting- with-sage/ • Sage Disclosure: – https://www.mozdev.org/bugs/show_bug.cgi?id=20610 Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 40
  • 41. References – CoolPreviews • http://www.security- assessment.com/files/advisories/CoolPreviews_Firefox_Ext ension_Security_Advisory.pdf – Update Scanner • http://www.security- assessment.com/files/advisories/CoolPreviews_Firefox_Ext ension_Security_Advisory.pdf – ScribeFire • http://www.security- assessment.com/files/advisories/ScribeFire_Firefox_Extensi on_Privileged_Code_Injection.pdf Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 41
  • 42. References – Feed Sidebar • http://www.security- assessment.com/files/advisories/ScribeFire_Firefox_Extensi on_Privileged_Code_Injection.pdf – WizzRSS • http://www.security- assessment.com/files/advisories/WizzRSS_Firefox_Extensio n_Privileged_Code_Injection.pdf Securitybyte & OWASP Confidential Securitybyte & OWASP AppSec Conference 2009 42