SlideShare a Scribd company logo

Window Shopping Browser - Bug Hunting in 2012

Roberto Suggi Liverani
Roberto Suggi LiveraniPentester/Reseacher
Window Shopping:
Browser Bug Hunting in 2012
                Roberto Suggi Liverani / Scott Bell –
                    Security-Assessment.com
                          HITB2012AMS
Who Are We?

 Roberto Suggi Liverani (@malerisch)
    Principal Security Consultant
    Security-Assessment.com – www.security-assessment.com
    Blog and research: http://blog.malerisch.net/p/security-research.html


 Scott Bell
    Principal Security Consultant
    Security-Assessment.com - www.security-assessment.com
Agenda

 Introduction
    Our approach and why


 Window Shopping!
    Bugs showcase
    Fun, pain and results
    Demos


 Conclusions
Introduction

 Why target browsers?
   Predominant desktop application
   Tech shifting towards client-side
   Chances to find cool bugs


 Approach
   Wide angle - not limited to memory corruption bugs
   Injection attacks and policy/rules bypass
Window Shopping!




Anyone who lives within their means suffers from a lack of imagination. ~Oscar Wilde
Firefox - Use-After-Free < 11

   Severity:
   Exploit: Remote Code Execution (no DEP)
   Credits: Scott Bell & Blair Strang
   Status: Patched in FF 11 (win7)
   CVE: 2012-0454
   Vendor Response:
     Bug fixed but took a long time
     Mozilla developers struggled to replicate and fix this bug
 Approach: modded version of cross_fuzz
     cross_fuzz - http://lcamtuf.coredump.cx/cross_fuzz/
What product are you selling me?

 UAF (Use-After-Free)
   Referencing memory after it has been freed can cause a program to:
      Crash
      Use unexpected values
      Execute arbitrary code
FF Use-After-Free

 Modified cross_fuzz
   Added more entropy via:
   Randomising call parameter
    count
   Removing toggle_gc()
   Changing ‘document.
    designMode=on'
    be controlled by the parent
    window
   Changing fuzz variables
FF Use-After-Free

 Modified cross_fuzz
   Implemented HTMLGen to generate different HTML each run
   Waited for the DOM to load in child windows before crawling.
      This cuts out timing issues/different fuzz path results.
   Removed phases - only leaving some e.g. tweak_properties()




                                                                   using only
                                                                   one phase
FF Use-After-Free

 Minimising
     JSLOG – Firefox Extension (Blair Strang)
     Used JSLOG to dump DOM operations
     Observed browser behaviour around the time of crash
     Followed browser behaviour in the debugger
     A lot of late nights :)
FF Use-After-Free

 Minimising
   Noted consistencies at the time of crash
   Referenced consistencies with JSLOG output
   Manually tried various scenarios based upon what we observed
 Result
   Reduced very complex HTML test case to a simple HTML template
   Thousands of JavaScript DOM operations reduced to few
FF Use-After-Free - PoC 1/3

 Parent.html
FF Use-After-Free – PoC 2/3

 Child.html
FF Use-After-Free – PoC 3/3


                             3. Parent closes child while
                               File open dialog is open
PARENT
1. Parent spawns child



                                   CHILD


          2. Parent performs click on form
              file open dialog spawns
FF Use-After-Free Analysis

 Analysing
   An obvious Use-after-free
   Windows heap manager writes the pattern 0xFEEEFEEE to
    HeapFree'd locations
   Looks pretty exploitable too, crashes on a CALL :)
FF Use-After-Free - Analysis

 Analysing
   Crazy unknown stack trace - doesn't really help
   Speculation: seems to be going through some Windows internals
FF Use-After-Free

 Conclusion
   Very ‘timing sensitive’
   Need for specific heap layout
   No DEP/ASLR bypass



      DEMO – Firefox Use After Free Code Execution




  If anyone is interested in improving current exploit, please contact us
Maxthon - XCS and SOP Bypass

   Severity:
   Exploit: Remote Code Execution
   Credits: Roberto Suggi Liverani
   CVE: n/a
   Status: Unpatched!
   Vendor Response:
       13/02/2012 - bugs reported to multiple contacts
       21/02/2012 - reception of report confirmed but no further reply
       21/02/2012 - chased them, no reply
       02-05/2012 - 11 new releases following the report – 1 bug silently fixed
 Approach: targeted – looking for injection points
What product are you selling me?

 XCS or Cross-zone scripting
    Cross Zone Scripting coined for IE
     http://en.wikipedia.org/wiki/Cross-zone_scripting
    XCS coined for Firefox and injection in chrome://
 What is XCS?
    An XSS in a privileged browser zone
    An intrinsic Same-Origin Policy (SOP) bypass :-)
 Each browser has a privileged zone:
      FF - chrome://
      Chrome - chrome://
      Opera - opera://
      Maxthon - mx://
      Avant - browser://
XCS

 Browser privileged/trusted zone
    Access to internal API interfaces:
       File system, browser settings, bookmarks, storage, etc.
 Some references from the past
    Opera XSS found in opera:history
       RCE exploit in opera:config (Kuza55 / Stefano Di Paola / Aviv Raff)
    FF addons research with Nick Freeman
       Multiple RCE exploits released in FF addons


 XCS exploits are 100% reliable
A bit about Maxthon

 Developed by: Maxthon International (China)

 Architecture
   Supports Trident and Webkit layout engines
   Focus on performance and extra features


 Some stats - according to Maxthon
    130 million users
    Users spread over 120 countries
    500,000,000 downloads in 2k10
Maxthon – The bugs

 Cross Context Scripting
    about:history zone
    Feed Reader (about:reader) and RSS Viewer
    Bookmark Toolbar and Bookmark Sidebar
 Incorrect Executable File Handling
 Same-Origin Policy (SOP) Bypass
 DNS Poisoning/MiTM – i.maxthon.com

 Remote Code Execution possible in 5 different ways!
Maxthon - XCS via location.hash

 Injection via location.hash




 Maliciouspage.html – performs redirection



 Injected payload executes in about:history
Maxthon XCS in RSS

 Injection via <title>, <link>, <description> tags
Maxthon - XCS in Bookmarks
Maxthon – Further bugs

 External Tools Direct Invokation
    Maxthon can invoke executables
    window.open("file://C:/windows/system/cmd32.exe");
    pop up blocker -> but if user accepts, exe is called
 SOP Bypass
    Tested window.open() with following results:
       From: http:// - window.open(‘file://….’)
        Prompts a popup blocker, if the user allows the pop up, the file://
        window is opened
       From: http:// - window.open(‘about://*’)
        spawns a new window
       From: http:// - window.open(‘mx://res/*’)
        forbidden by SOP
Maxthon – i.maxthon.com (1/2)

 i.maxthon.com
   sets
    interesting DOM
    objects
       runtime
       Maxthon
Maxthon – i.maxthon.com (2/2)

 Design Issues
      i.maxthon.com = trusted domain
      i.maxthon.com allows direct access to privileged APIs
      No control on resolution of IP address
      No use of SSL
 MiTM Bug
    DNS poisoning
       Force resolution of i.maxthon.com to a controlled IP address
    HTTP MiTM
       i.maxthon.com served over HTTP – malicious proxy which alters
        page content
 Other implications
    XSS in real i.maxthon.com site
DEMO - Maxthon multiple vulnerabilities
Avant Browser – XCS & SOP Bypass

   Severity:
   Exploit: History Stealing, XSS, misc
   Credits: Roberto Suggi Liverani
   CVE: n/a
   Status: Unpatched!
   Vendor Response:
       07/03/2012 - had to post 10 posts to a forum to get a contact!
       14/03/2012 - reception of report confirmed but no further reply
       14/03/2012 - chased them, no reply
       03-05/2012 - 2 new releases following the report, one bug silently fixed
 Approach: targeted - looking for injection points
Avant Browser

 Avant Browser - Avant Force (China)
    Custom web browser application
    Designed to expand services provided by IE
    From FAQ: Is Avant Browser a secure browser? Yes, Avant Browser is
     secure. Since it's based on Internet Explorer, Avant Browser is as
     secure as Internet Explorer. Avant Browser supports all SSL secured
     websites. Avant Browser's encryption length is the same as Internet
     Explorer's.
 Two versions: lite (only IE) & ultimate (IE, FF, Chrome)
 More downloads than Chrome, IE and Opera in CNET
A bit about Avant (1/3)


 Firefox
 wrapped
 version                     Arguments
                             passed to
                             firefox.exe




Avant.exe -
parent of
firefox.exe
A bit about Avant (2/3)

 Interesting files
    "C:Program FilesAvant Browserres" folder:




 Observations
    home.tpl is rendered at browser:home
    rss.tpl is rendered at browser://localhost/lst?url/path/to/rss/feed
    Such pages use privileged JavaScript function
     window.AFRunCommand()
    Pages provided examples on how to call privileged functions and
     aided exploitation
A bit about Avant (3/3)

 Testing AFRunCommand()
   Undocumented Avant browser function
   Try{}/Catch{} no output
   Bruteforce only option – passing a single parameter:
      60003 - window.external.HistoryUrls() - [used in exploit]
      60011 - prompt for download
      10021 - add to ad block specified site
      3 - spawns an empty tab
      10010 - reloads the page
      10013 - search for keywords
      10014 - pop up blocker
      10016 - download a video (argument passed as URL)
      10017 - add task for download scheduler
      10025 - search keywords
Avant Browsers – The bugs

 Same-Origin Policy (SOP) Bypass
  browser:home

 Cross Context Scripting
  browser:home – Most Visited And History Tabs

 Stored Cross Site Scripting
  Feed Reader (browser://localhost/lst?*)
Avant Browser – Showcase

 SOP Bypass - History Stealing
Avant Browser – Showcase

 XCS in browser:home – History Stealing
   Injection via <title> HTML element




   Cross Site Scripting Payload Rendered In browser:home Privileged
    Zone
Avant Browser – Stored XSS via RSS

 Injection via <title>, <link> and <description> tags
DEMO – Avant Browser
nsIScriptableUnescapeHTML.parseFragment() Bypass




 Severity:
 Impact: Remote Code Execution
 Credits: Roberto Suggi Liverani
 Status: Patched in FF 3.6.14,
  Thunderbird 3.1.8, and SeaMonkey 2.0.12
 CVE: 2010-1585
 Vendor Response:




 Approach: investigating a Firefox addon developer’s doubt
Some background

 nsIScriptableUnescapeHTML.parseFragment()
     Critical function used to filter and sanitise data
     Mostly used in the context of filtering data in chrome:// priv zone
     Recommended and deemed safe to use for addons devs
     Wizzrss (FF addon) found to be vulnerable using a bypass
Standard Case - Filtering

 HTML Payload



 Processed by parseFragment() becomes:



 <script> is stripped out
    Only HTML payload remains
    Safe to append in chrome:// DOM
Bypass Test Case

 HTML payload



 Processed by parseFragment() becomes:




 With user interaction payload can be triggered in
  privileged browser zone – chrome://
DEMO – Code Execution in WizzRSS FF addon -
nsIScriptableUnescapeHTML.parseFragment() bypass


     demo video kindly provided by @0x7674 (Nick Freeman)
Opera Use-After-Free < 11.52

   Severity:
   Exploit: Crash
   Credits: Roberto Suggi Liverani
   CVE: 2011-4152
   Status: Patched in Opera 11.52
   Vendor Response:
     Recognised as a memory corruption bug
     Not a security issue since no exploit is provided
     But Opera kept asking for an exploit
 Approach: using own fuzzers
Opera Use-After-Free < 11.52

 Simplified test-case
    Clone, remove, append
    Use of contenteditable
     attribute for <em> and
     <strong> lead to crash
    Crash works if heap spray()
     occurs
    Couldn’t find an exploit 
    Opera’s position:
     not exploitable
DEMO - Opera – Use-After-Free Crash
FF/Opera – XCS via bookmarks

 Severity:
 Impact: Code Execution
 Credits: Roberto Suggi Liverani

 Firefox - Status: Patched in FF 11
 Bug reported by someone else

 Opera - Status: Won’t fix
 Opera Vendor Response:
    Multiple exploit steps required – won’t fix
 Approach: looking at injection in and from bookmarks
In a few words

 Ancient bug: reported in 2k5 by M. Krax
 User is lured into bookmarking a:
    Malicious javascript: URI + payload


 User clicks on malicious bookmark
    Focus on standard web page – Impact: UXSS
    Focus on privileged browser zone – Impact: XCS
 Many ways to fool users:
    Security controls on status bar can be partially fooled
    JavaScript can be compressed and obfuscated
    Code can be hidden – e.g. Opera NULL byte issue in view source -
     @Agarri_FR
DEMO - XCS via bookmarks
                  Opera and Firefox




                   Brendan Eich – 2k5
There’s nothing wrong with using javascript: URLs in chrome.
 What’s good for content is good for chrome, often enough.
Conclusions

 Disclosure Fail
    Some browser vendors still do not understand how
     reporting and security disclosure works


 Bug complexity vs. impact
    Injection bugs are simple but impact can be significant
    No need to find memory corruption bugs to achieve code execution


 Delegated security
    Presenting browsers as secure as IE or Chrome give false sense of
     security to end-users
Special thanks

 Blair Strang
 Thanks to the SA team for inspiration

 Advisories and exploit code for today’s demonstrations
  will be released in the near future
 Thanks for coming along, and enjoy the rest of the con

 If you have questions, come find us later on!
    Roberto Suggi Liverani - @malerisch
       http://blog.malerisch.net
    Scott Bell – scott.bell@security-assessment.com
References

 cross_fuzz
    http://lcamtuf.coredump.cx/cross_fuzz/
    http://lcamtuf.blogspot.co.nz/2011/01/announcing-crossfuzz-potential-
     0-day-in.html
 Firefox Use-after-free
    http://www.mozilla.org/security/announce/2012/mfsa2012-12.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0454
    https://bugzilla.mozilla.org/show_bug.cgi?id=684555
 Firefox nsiscriptable CVE
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585
 Opera Use After Free
    http://malerisch.net/docs/advisories/opera_use_after_free_crash_poc.
     html
References

 Cross Context Scripting in Firefox addons
    http://malerisch.net/docs/cross_context_scripting/Cross_Context_Scrip
     ting_with_Firefox.html
 Exploiting Firefox Extensions
    http://www.slideshare.net/robertosl81/exploiting-firefox-extensions
 WizzRSS – Security Advisory
    http://www.security-
     assessment.com/files/advisories/WizzRSS_Firefox_Extension_Privileg
     ed_Code_Injection.pdf
 Opera fail:
    José Antonio Vázquez (@0xde1) - http://www.enred20.org/node/27
    http://my.opera.com/securitygroup/blog/2011/10/19/about-the-svg-font-
     manipulation-vulnerability-that-was-fixed-in-11-52#comments
References

 Spoof Status Bar:
    https://bug338459.bugzilla.mozilla.org/attachment.cgi?id=222524
 Don't allow bookmarking an evaluated+loaded javascript:
  URL
    https://bugzilla.mozilla.org/show_bug.cgi?id=371179
 Opera Stored XSS
    http://seclists.org/fulldisclosure/2008/Oct/394
 Avant Forum Contact
    http://forum.avantbrowser.com/viewtopic.php?f=21&t=31119&p=18272
     4&hilit=report+security#p182724
 Heap Spraying Demystified
    https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-
     part-11-heap-spraying-demystified/
References

 Blog – Roberto Suggi Liverani
    http://blog.malerisch.net/
 Twitter account - @malerisch
    https://twitter.com/malerisch
 Security-Assessment.com Research
    http://www.security-assessment.com/page/archive.htm
 Nick Freeman – Publications
    http://atta.cked.me/publications
1 of 56

Window Shopping Browser - Bug Hunting in 2012

Download to read offline

Web browsers have become part of everyday life, and are relied upon by millions of internet citizens each day. The feature rich online world has turned the once simple web browser into a highly complex (and very often insecure) desktop application. As browser vendors have extended functionality and support to new technologies, security researchers and hackers are continuously looking for new vulnerabilities. In this talk, Roberto and Scott will share results of their assiduous browser bug hunting. The talk will examine techniques used to discover critical and less severe vulnerabilities in some of the most popular browsers on the market. This talk will focus heavily (but not exclusively) on the following areas: - Memory corruption bugs; - New approaches to DOM fuzzing; - Old school techniques against new browser technology; - Cross Context Scripting and injection attacks; - SOP Bypass; The presentation will conclude with a montage of on-stage demonstrations of previously unreleased vulnerabilities, including remote code execution, injections and other tailored browser exploits.

Roberto Suggi Liverani
Roberto Suggi LiveraniPentester/Reseacher

Recommended

Cross Context Scripting attacks & exploitation by
Cross Context Scripting attacks & exploitationCross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationRoberto Suggi Liverani
3.5K views69 slides
Augmented reality in your web proxy by
Augmented reality in your web proxyAugmented reality in your web proxy
Augmented reality in your web proxyRoberto Suggi Liverani
3.3K views39 slides
I got 99 trends and a # is all of them by
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of themRoberto Suggi Liverani
5.8K views122 slides
Defending Against Application DoS attacks by
Defending Against Application DoS attacksDefending Against Application DoS attacks
Defending Against Application DoS attacksRoberto Suggi Liverani
5.1K views51 slides
Exploiting Firefox Extensions by
Exploiting Firefox ExtensionsExploiting Firefox Extensions
Exploiting Firefox ExtensionsRoberto Suggi Liverani
3.5K views42 slides
When you don't have 0days: client-side exploitation for the masses by
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesMichele Orru
59.9K views34 slides
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions by
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome ExtensionsI'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome ExtensionsKrzysztof Kotowicz
9.7K views49 slides
Bug Bounty Hunter Methodology - Nullcon 2016 by
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016bugcrowd
12.3K views82 slides

More Related Content

What's hot

Neat tricks to bypass CSRF-protection by
Neat tricks to bypass CSRF-protectionNeat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protectionMikhail Egorov
17.6K views38 slides
Introducing OWASP OWTF Workshop BruCon 2012 by
Introducing OWASP OWTF Workshop BruCon 2012Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012Abraham Aranguren
6.4K views165 slides
[Wroclaw #2] Web Application Security Headers by
[Wroclaw #2] Web Application Security Headers[Wroclaw #2] Web Application Security Headers
[Wroclaw #2] Web Application Security HeadersOWASP
1K views35 slides
Flashack by
FlashackFlashack
Flashackn|u - The Open Security Community
2.4K views19 slides
Buried by time, dust and BeEF by
Buried by time, dust and BeEFBuried by time, dust and BeEF
Buried by time, dust and BeEFMichele Orru
5.3K views32 slides
Owasp AppSecEU 2015 - BeEF Session by
Owasp AppSecEU 2015 - BeEF SessionOwasp AppSecEU 2015 - BeEF Session
Owasp AppSecEU 2015 - BeEF SessionBart Leppens
5.7K views71 slides
Advances in BeEF - AthCon2012 by
Advances in BeEF - AthCon2012Advances in BeEF - AthCon2012
Advances in BeEF - AthCon2012Michele Orru
14.3K views25 slides
Secuirty News Bytes-Bangalore may 2014 by
Secuirty News Bytes-Bangalore may 2014 Secuirty News Bytes-Bangalore may 2014
Secuirty News Bytes-Bangalore may 2014 n|u - The Open Security Community
1.8K views14 slides
Cloud forensics putting the bits back together by
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back togetherShakacon
443 views67 slides
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs. by
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.Mikhail Egorov
6.1K views59 slides
Windows Operating System Archaeology by
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeologyenigma0x3
13.8K views47 slides
Continuous intrusion: Why CI tools are an attacker’s best friends by
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsNikhil Mittal
1.8K views65 slides
20+ ways to bypass your mac os privacy mechanisms by
20+ ways to bypass your mac os privacy mechanisms20+ ways to bypass your mac os privacy mechanisms
20+ ways to bypass your mac os privacy mechanismsCsaba Fitzl
2.4K views58 slides
Defcon - Veil-Pillage by
Defcon - Veil-PillageDefcon - Veil-Pillage
Defcon - Veil-PillageVeilFramework
4.3K views51 slides
TakeDownCon Rocket City: WebShells by Adrian Crenshaw by
TakeDownCon Rocket City: WebShells by Adrian CrenshawTakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian CrenshawEC-Council
13.4K views45 slides
Browser exploit framework by
Browser exploit frameworkBrowser exploit framework
Browser exploit frameworkPrashanth Sivarajan
960 views13 slides
Anatomy of PHP Shells by
Anatomy of PHP ShellsAnatomy of PHP Shells
Anatomy of PHP ShellsVedran Krivokuca
3.3K views39 slides
Make CSRF Again by
Make CSRF AgainMake CSRF Again
Make CSRF AgainNetsparker
375 views37 slides
Not a Security Boundary: Bypassing User Account Control by
Not a Security Boundary: Bypassing User Account ControlNot a Security Boundary: Bypassing User Account Control
Not a Security Boundary: Bypassing User Account Controlenigma0x3
6.7K views56 slides
Browser Exploitation Framework Tutorial by
Browser Exploitation Framework TutorialBrowser Exploitation Framework Tutorial
Browser Exploitation Framework Tutorialimlaurel2
4.5K views33 slides

What's hot (20)

Neat tricks to bypass CSRF-protection by Mikhail Egorov
Neat tricks to bypass CSRF-protectionNeat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protection
Mikhail Egorov17.6K views
Introducing OWASP OWTF Workshop BruCon 2012 by Abraham Aranguren
Introducing OWASP OWTF Workshop BruCon 2012Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012
Abraham Aranguren6.4K views
[Wroclaw #2] Web Application Security Headers by OWASP
[Wroclaw #2] Web Application Security Headers[Wroclaw #2] Web Application Security Headers
[Wroclaw #2] Web Application Security Headers
OWASP1K views
Buried by time, dust and BeEF by Michele Orru
Buried by time, dust and BeEFBuried by time, dust and BeEF
Buried by time, dust and BeEF
Michele Orru5.3K views
Owasp AppSecEU 2015 - BeEF Session by Bart Leppens
Owasp AppSecEU 2015 - BeEF SessionOwasp AppSecEU 2015 - BeEF Session
Owasp AppSecEU 2015 - BeEF Session
Bart Leppens5.7K views
Advances in BeEF - AthCon2012 by Michele Orru
Advances in BeEF - AthCon2012Advances in BeEF - AthCon2012
Advances in BeEF - AthCon2012
Michele Orru14.3K views
Cloud forensics putting the bits back together by Shakacon
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back together
Shakacon443 views
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs. by Mikhail Egorov
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.
Mikhail Egorov6.1K views
Windows Operating System Archaeology by enigma0x3
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeology
enigma0x313.8K views
Continuous intrusion: Why CI tools are an attacker’s best friends by Nikhil Mittal
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friends
Nikhil Mittal1.8K views
20+ ways to bypass your mac os privacy mechanisms by Csaba Fitzl
20+ ways to bypass your mac os privacy mechanisms20+ ways to bypass your mac os privacy mechanisms
20+ ways to bypass your mac os privacy mechanisms
Csaba Fitzl2.4K views
Defcon - Veil-Pillage by VeilFramework
Defcon - Veil-PillageDefcon - Veil-Pillage
Defcon - Veil-Pillage
VeilFramework4.3K views
TakeDownCon Rocket City: WebShells by Adrian Crenshaw by EC-Council
TakeDownCon Rocket City: WebShells by Adrian CrenshawTakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
EC-Council13.4K views
Make CSRF Again by Netsparker
Make CSRF AgainMake CSRF Again
Make CSRF Again
Netsparker375 views
Not a Security Boundary: Bypassing User Account Control by enigma0x3
Not a Security Boundary: Bypassing User Account ControlNot a Security Boundary: Bypassing User Account Control
Not a Security Boundary: Bypassing User Account Control
enigma0x36.7K views
Browser Exploitation Framework Tutorial by imlaurel2
Browser Exploitation Framework TutorialBrowser Exploitation Framework Tutorial
Browser Exploitation Framework Tutorial
imlaurel24.5K views

Viewers also liked

Understanding Data Mining in the Social Media Marketing Age by
Understanding Data Mining in the Social Media Marketing AgeUnderstanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing AgeSherman Mohr Jr.
638 views27 slides
About The BSH Group, LLC by
About The BSH Group, LLCAbout The BSH Group, LLC
About The BSH Group, LLCMaisha B. Hoye
598 views12 slides
Neumotorax by
NeumotoraxNeumotorax
NeumotoraxGaston Droguett
386 views2 slides
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem... by
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem..."La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...Gustavo Martin
1.1K views23 slides
10. unidad 1 by
10.  unidad 110.  unidad 1
10. unidad 1RossyPalmaM Palma M
1.1K views47 slides
tl;dr Marketing Aug 2015 by
tl;dr Marketing Aug 2015 tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015 Saijo George
360 views21 slides
tango 2013 escuela by
tango 2013 escuelatango 2013 escuela
tango 2013 escuelacynthiasamara
531 views13 slides
Abrazo Salvador by
Abrazo SalvadorAbrazo Salvador
Abrazo Salvadordunia segarra
385 views15 slides
Biogeomon 2009 72 by
Biogeomon 2009 72Biogeomon 2009 72
Biogeomon 2009 72Rustan Gleb
3.1K views522 slides
HospitalMergersMAIN_JMujica by
HospitalMergersMAIN_JMujicaHospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujicaJennifer Mujica
410 views4 slides
Wanderkarte Pillerseetal by
Wanderkarte PillerseetalWanderkarte Pillerseetal
Wanderkarte PillerseetalTirolerAdler
1.2K views1 slide
Reglamento unificado de elecciones estudiantiles - ESPOL by
Reglamento unificado de elecciones estudiantiles - ESPOLReglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOLAdib Manssur
1.1K views12 slides
Catalogo tokyoto luggage 2011 Español by
Catalogo tokyoto luggage 2011 EspañolCatalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 EspañolDavid Rodriguez
406 views8 slides
A Comprehensive Approach to Secure Group Communication in Wireless Networks by
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksDavid González Romero
1.1K views47 slides
Культура Японії by
Культура ЯпоніїКультура Японії
Культура ЯпоніїM S
210 views2 slides
Curriculum EspañolAP by
Curriculum EspañolAPCurriculum EspañolAP
Curriculum EspañolAPArturo Palacios
583 views4 slides
REVISTA INSTITUCIONAL by
REVISTA INSTITUCIONALREVISTA INSTITUCIONAL
REVISTA INSTITUCIONALAgencia de Propaganda Rodrigues
1.5K views56 slides
Boletín 2013 ii ucv by
Boletín 2013 ii ucvBoletín 2013 ii ucv
Boletín 2013 ii ucvNancy Soto
3K views19 slides
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus by
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virusNavaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virusINCIDE
1K views37 slides
El Arte de Comer Sano by
El Arte de Comer SanoEl Arte de Comer Sano
El Arte de Comer SanoBamboga art
1.4K views64 slides

Viewers also liked (20)

Understanding Data Mining in the Social Media Marketing Age by Sherman Mohr Jr.
Understanding Data Mining in the Social Media Marketing AgeUnderstanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing Age
Sherman Mohr Jr.638 views
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem... by Gustavo Martin
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem..."La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
Gustavo Martin1.1K views
tl;dr Marketing Aug 2015 by Saijo George
tl;dr Marketing Aug 2015 tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015
Saijo George360 views
Biogeomon 2009 72 by Rustan Gleb
Biogeomon 2009 72Biogeomon 2009 72
Biogeomon 2009 72
Rustan Gleb3.1K views
Wanderkarte Pillerseetal by TirolerAdler
Wanderkarte PillerseetalWanderkarte Pillerseetal
Wanderkarte Pillerseetal
TirolerAdler1.2K views
Reglamento unificado de elecciones estudiantiles - ESPOL by Adib Manssur
Reglamento unificado de elecciones estudiantiles - ESPOLReglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOL
Adib Manssur1.1K views
Catalogo tokyoto luggage 2011 Español by David Rodriguez
Catalogo tokyoto luggage 2011 EspañolCatalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 Español
David Rodriguez406 views
A Comprehensive Approach to Secure Group Communication in Wireless Networks by David González Romero
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless Networks
Культура Японії by M S
Культура ЯпоніїКультура Японії
Культура Японії
M S210 views
Boletín 2013 ii ucv by Nancy Soto
Boletín 2013 ii ucvBoletín 2013 ii ucv
Boletín 2013 ii ucv
Nancy Soto3K views
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus by INCIDE
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virusNavaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
INCIDE1K views
El Arte de Comer Sano by Bamboga art
El Arte de Comer SanoEl Arte de Comer Sano
El Arte de Comer Sano
Bamboga art1.4K views

Similar to Window Shopping Browser - Bug Hunting in 2012

Web browsertico by
Web browserticoWeb browsertico
Web browserticotico3195
449 views18 slides
Os Henrikson by
Os HenriksonOs Henrikson
Os Henriksonoscon2007
775 views19 slides
Nice performance using Sf2 cache wrapping Sf1 application by
Nice performance using Sf2 cache wrapping Sf1 applicationNice performance using Sf2 cache wrapping Sf1 application
Nice performance using Sf2 cache wrapping Sf1 applicationMarc Weistroff
1.9K views55 slides
Mozilla: Under the Hood by
Mozilla: Under the HoodMozilla: Under the Hood
Mozilla: Under the Hoodmozillamarcia
6.8K views66 slides
Web browsers by
Web browsersWeb browsers
Web browserscarlos19995
1.3K views15 slides
Web browsers by
Web browsersWeb browsers
Web browserscarlos19995
210 views15 slides
Internet browsers by Andres Haydar by
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres HaydarAndresHaydar
377 views17 slides
Firefox security (prasanna) by
Firefox security (prasanna) Firefox security (prasanna)
Firefox security (prasanna) ClubHack
877 views33 slides
Hacking The World With Flash by
Hacking The World With FlashHacking The World With Flash
Hacking The World With Flashjoepangus
1.1K views26 slides
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp... by
BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...BlueHat Security Conference
587 views46 slides
Trabajo de jose by
Trabajo de jose Trabajo de jose
Trabajo de jose josemgg
151 views17 slides
(In)Security Implication in the JS Universe by
(In)Security Implication in the JS Universe(In)Security Implication in the JS Universe
(In)Security Implication in the JS UniverseStefano Di Paola
1.6K views49 slides
Browsers by
BrowsersBrowsers
BrowsersSebastian Lora
148 views29 slides
Browsers by
BrowsersBrowsers
BrowsersSebastian Lora
317 views29 slides
Browsers by
BrowsersBrowsers
BrowsersSebastian Lora
176 views29 slides
Afik Gal @alphageeks: Flex Intro by
Afik Gal @alphageeks: Flex IntroAfik Gal @alphageeks: Flex Intro
Afik Gal @alphageeks: Flex IntroAlphageeks
613 views25 slides
Andriod - Technical Review by
Andriod - Technical ReviewAndriod - Technical Review
Andriod - Technical ReviewFolio3 Software
895 views36 slides
Browsers . by
Browsers .Browsers .
Browsers .seripa3
148 views31 slides
News bytes Oct-2011 by
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011Ashwin Patil, GCIH, GCIA, GCFE
522 views16 slides
Building a Real-World Application with Adobe Flex 2 by
Building a Real-World Application with Adobe Flex 2Building a Real-World Application with Adobe Flex 2
Building a Real-World Application with Adobe Flex 2dcoletta
1.1K views26 slides

Similar to Window Shopping Browser - Bug Hunting in 2012 (20)

Web browsertico by tico3195
Web browserticoWeb browsertico
Web browsertico
tico3195449 views
Os Henrikson by oscon2007
Os HenriksonOs Henrikson
Os Henrikson
oscon2007775 views
Nice performance using Sf2 cache wrapping Sf1 application by Marc Weistroff
Nice performance using Sf2 cache wrapping Sf1 applicationNice performance using Sf2 cache wrapping Sf1 application
Nice performance using Sf2 cache wrapping Sf1 application
Marc Weistroff1.9K views
Mozilla: Under the Hood by mozillamarcia
Mozilla: Under the HoodMozilla: Under the Hood
Mozilla: Under the Hood
mozillamarcia6.8K views
Internet browsers by Andres Haydar by AndresHaydar
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres Haydar
AndresHaydar377 views
Firefox security (prasanna) by ClubHack
Firefox security (prasanna) Firefox security (prasanna)
Firefox security (prasanna)
ClubHack877 views
Hacking The World With Flash by joepangus
Hacking The World With FlashHacking The World With Flash
Hacking The World With Flash
joepangus1.1K views
Trabajo de jose by josemgg
Trabajo de jose Trabajo de jose
Trabajo de jose
josemgg151 views
(In)Security Implication in the JS Universe by Stefano Di Paola
(In)Security Implication in the JS Universe(In)Security Implication in the JS Universe
(In)Security Implication in the JS Universe
Stefano Di Paola1.6K views
Afik Gal @alphageeks: Flex Intro by Alphageeks
Afik Gal @alphageeks: Flex IntroAfik Gal @alphageeks: Flex Intro
Afik Gal @alphageeks: Flex Intro
Alphageeks613 views
Browsers . by seripa3
Browsers .Browsers .
Browsers .
seripa3148 views
Building a Real-World Application with Adobe Flex 2 by dcoletta
Building a Real-World Application with Adobe Flex 2Building a Real-World Application with Adobe Flex 2
Building a Real-World Application with Adobe Flex 2
dcoletta1.1K views

More from Roberto Suggi Liverani

None More Black - the Dark Side of SEO by
None More Black - the Dark Side of SEONone More Black - the Dark Side of SEO
None More Black - the Dark Side of SEORoberto Suggi Liverani
21K views58 slides
Bridging the gap - Security and Software Testing by
Bridging the gap - Security and Software TestingBridging the gap - Security and Software Testing
Bridging the gap - Security and Software TestingRoberto Suggi Liverani
1.2K views31 slides
Black Energy18 - Russian botnet package analysis by
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisRoberto Suggi Liverani
1.8K views48 slides
XPath Injection by
XPath InjectionXPath Injection
XPath InjectionRoberto Suggi Liverani
7.1K views23 slides
Web Spam Techniques by
Web Spam TechniquesWeb Spam Techniques
Web Spam TechniquesRoberto Suggi Liverani
78.8K views53 slides
Reversing JavaScript by
Reversing JavaScriptReversing JavaScript
Reversing JavaScriptRoberto Suggi Liverani
2.9K views48 slides
Ajax Security by
Ajax SecurityAjax Security
Ajax SecurityRoberto Suggi Liverani
2K views33 slides
Browser Security by
Browser SecurityBrowser Security
Browser SecurityRoberto Suggi Liverani
16.4K views28 slides

Recently uploaded

Business Analyst Series 2023 - Week 5 Session 9 by
Business Analyst Series 2023 -  Week 5 Session 9Business Analyst Series 2023 -  Week 5 Session 9
Business Analyst Series 2023 - Week 5 Session 9DianaGray10
109 views13 slides
Incremental data processing with Hudi & Spark + dbt.pdf by
Incremental data processing with Hudi & Spark + dbt.pdfIncremental data processing with Hudi & Spark + dbt.pdf
Incremental data processing with Hudi & Spark + dbt.pdfnadine39280
17 views20 slides
Qualifying SaaS, IaaS.pptx by
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptxSachin Bhandari
1.2K views8 slides
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PC Cluster Consortium
43 views12 slides
LLMs in Production: Tooling, Process, and Team Structure by
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team StructureAggregage
110 views77 slides
Cocktail of Environments. How to Mix Test and Development Environments and St... by
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...Aleksandr Tarasov
27 views135 slides
Discover Aura Workshop (12.5.23).pdf by
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdfNeo4j
28 views55 slides
Optimizing Communication to Optimize Human Behavior - LCBM by
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBMYaman Kumar
46 views49 slides
Show and tell: What’s in your tech stack? - Tech Forum 2023 by
Show and tell: What’s in your tech stack? - Tech Forum 2023Show and tell: What’s in your tech stack? - Tech Forum 2023
Show and tell: What’s in your tech stack? - Tech Forum 2023BookNet Canada
40 views78 slides
The Power of Generative AI in Accelerating No Code Adoption.pdf by
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdfSaeed Al Dhaheri
58 views18 slides
Five Ways to Automate API Testing with Postman by
Five Ways to Automate API Testing with PostmanFive Ways to Automate API Testing with Postman
Five Ways to Automate API Testing with PostmanPostman
48 views31 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
187 views59 slides
[2024] GDSC India - Discover, Design, Develop.pdf.pdf by
[2024] GDSC India - Discover, Design, Develop.pdf.pdf[2024] GDSC India - Discover, Design, Develop.pdf.pdf
[2024] GDSC India - Discover, Design, Develop.pdf.pdfbcedsc
28 views19 slides
Data Mesh using Microsoft Fabric by
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricNathan Bijnens
76 views32 slides
Choosing the Right Flutter App Development Company by
Choosing the Right Flutter App Development CompanyChoosing the Right Flutter App Development Company
Choosing the Right Flutter App Development CompanyFicode Technologies
19 views9 slides
Initiating and Advancing Your Strategic GIS Governance Strategy by
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance StrategySafe Software
280 views68 slides
AI + Memoori = AIM by
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIMMemoori
41 views9 slides
Measuring User on the web with the core web vitals - by @theafolayan.pptx by
Measuring User on the web with the core web vitals - by @theafolayan.pptxMeasuring User on the web with the core web vitals - by @theafolayan.pptx
Measuring User on the web with the core web vitals - by @theafolayan.pptxOluwaseun Raphael Afolayan
15 views13 slides
Netmera Presentation.pdf by
Netmera Presentation.pdfNetmera Presentation.pdf
Netmera Presentation.pdfMustafa Kuğu
23 views50 slides
CyberSecurity Study Jam by
CyberSecurity Study JamCyberSecurity Study Jam
CyberSecurity Study JamSahilSingh368445
625 views14 slides

Recently uploaded (20)

Business Analyst Series 2023 - Week 5 Session 9 by DianaGray10
Business Analyst Series 2023 -  Week 5 Session 9Business Analyst Series 2023 -  Week 5 Session 9
Business Analyst Series 2023 - Week 5 Session 9
DianaGray10109 views
Incremental data processing with Hudi & Spark + dbt.pdf by nadine39280
Incremental data processing with Hudi & Spark + dbt.pdfIncremental data processing with Hudi & Spark + dbt.pdf
Incremental data processing with Hudi & Spark + dbt.pdf
nadine3928017 views
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
LLMs in Production: Tooling, Process, and Team Structure by Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage110 views
Cocktail of Environments. How to Mix Test and Development Environments and St... by Aleksandr Tarasov
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...
Discover Aura Workshop (12.5.23).pdf by Neo4j
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdf
Neo4j28 views
Optimizing Communication to Optimize Human Behavior - LCBM by Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar46 views
Show and tell: What’s in your tech stack? - Tech Forum 2023 by BookNet Canada
Show and tell: What’s in your tech stack? - Tech Forum 2023Show and tell: What’s in your tech stack? - Tech Forum 2023
Show and tell: What’s in your tech stack? - Tech Forum 2023
BookNet Canada40 views
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri58 views
Five Ways to Automate API Testing with Postman by Postman
Five Ways to Automate API Testing with PostmanFive Ways to Automate API Testing with Postman
Five Ways to Automate API Testing with Postman
Postman48 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash187 views
[2024] GDSC India - Discover, Design, Develop.pdf.pdf by bcedsc
[2024] GDSC India - Discover, Design, Develop.pdf.pdf[2024] GDSC India - Discover, Design, Develop.pdf.pdf
[2024] GDSC India - Discover, Design, Develop.pdf.pdf
bcedsc28 views
Data Mesh using Microsoft Fabric by Nathan Bijnens
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft Fabric
Nathan Bijnens76 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software280 views
AI + Memoori = AIM by Memoori
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIM
Memoori41 views

Window Shopping Browser - Bug Hunting in 2012

  • 1. Window Shopping: Browser Bug Hunting in 2012 Roberto Suggi Liverani / Scott Bell – Security-Assessment.com HITB2012AMS
  • 2. Who Are We?  Roberto Suggi Liverani (@malerisch)  Principal Security Consultant  Security-Assessment.com – www.security-assessment.com  Blog and research: http://blog.malerisch.net/p/security-research.html  Scott Bell  Principal Security Consultant  Security-Assessment.com - www.security-assessment.com
  • 3. Agenda  Introduction  Our approach and why  Window Shopping!  Bugs showcase  Fun, pain and results  Demos  Conclusions
  • 4. Introduction  Why target browsers?  Predominant desktop application  Tech shifting towards client-side  Chances to find cool bugs  Approach  Wide angle - not limited to memory corruption bugs  Injection attacks and policy/rules bypass
  • 5. Window Shopping! Anyone who lives within their means suffers from a lack of imagination. ~Oscar Wilde
  • 6. Firefox - Use-After-Free < 11  Severity:  Exploit: Remote Code Execution (no DEP)  Credits: Scott Bell & Blair Strang  Status: Patched in FF 11 (win7)  CVE: 2012-0454  Vendor Response:  Bug fixed but took a long time  Mozilla developers struggled to replicate and fix this bug  Approach: modded version of cross_fuzz  cross_fuzz - http://lcamtuf.coredump.cx/cross_fuzz/
  • 7. What product are you selling me?  UAF (Use-After-Free)  Referencing memory after it has been freed can cause a program to:  Crash  Use unexpected values  Execute arbitrary code
  • 8. FF Use-After-Free  Modified cross_fuzz  Added more entropy via:  Randomising call parameter count  Removing toggle_gc()  Changing ‘document. designMode=on' be controlled by the parent window  Changing fuzz variables
  • 9. FF Use-After-Free  Modified cross_fuzz  Implemented HTMLGen to generate different HTML each run  Waited for the DOM to load in child windows before crawling.  This cuts out timing issues/different fuzz path results.  Removed phases - only leaving some e.g. tweak_properties() using only one phase
  • 10. FF Use-After-Free  Minimising  JSLOG – Firefox Extension (Blair Strang)  Used JSLOG to dump DOM operations  Observed browser behaviour around the time of crash  Followed browser behaviour in the debugger  A lot of late nights :)
  • 11. FF Use-After-Free  Minimising  Noted consistencies at the time of crash  Referenced consistencies with JSLOG output  Manually tried various scenarios based upon what we observed  Result  Reduced very complex HTML test case to a simple HTML template  Thousands of JavaScript DOM operations reduced to few
  • 12. FF Use-After-Free - PoC 1/3  Parent.html
  • 13. FF Use-After-Free – PoC 2/3  Child.html
  • 14. FF Use-After-Free – PoC 3/3 3. Parent closes child while File open dialog is open PARENT 1. Parent spawns child CHILD 2. Parent performs click on form file open dialog spawns
  • 15. FF Use-After-Free Analysis  Analysing  An obvious Use-after-free  Windows heap manager writes the pattern 0xFEEEFEEE to HeapFree'd locations  Looks pretty exploitable too, crashes on a CALL :)
  • 16. FF Use-After-Free - Analysis  Analysing  Crazy unknown stack trace - doesn't really help  Speculation: seems to be going through some Windows internals
  • 17. FF Use-After-Free  Conclusion  Very ‘timing sensitive’  Need for specific heap layout  No DEP/ASLR bypass DEMO – Firefox Use After Free Code Execution If anyone is interested in improving current exploit, please contact us
  • 18. Maxthon - XCS and SOP Bypass  Severity:  Exploit: Remote Code Execution  Credits: Roberto Suggi Liverani  CVE: n/a  Status: Unpatched!  Vendor Response:  13/02/2012 - bugs reported to multiple contacts  21/02/2012 - reception of report confirmed but no further reply  21/02/2012 - chased them, no reply  02-05/2012 - 11 new releases following the report – 1 bug silently fixed  Approach: targeted – looking for injection points
  • 19. What product are you selling me?  XCS or Cross-zone scripting  Cross Zone Scripting coined for IE http://en.wikipedia.org/wiki/Cross-zone_scripting  XCS coined for Firefox and injection in chrome://  What is XCS?  An XSS in a privileged browser zone  An intrinsic Same-Origin Policy (SOP) bypass :-)  Each browser has a privileged zone:  FF - chrome://  Chrome - chrome://  Opera - opera://  Maxthon - mx://  Avant - browser://
  • 20. XCS  Browser privileged/trusted zone  Access to internal API interfaces:  File system, browser settings, bookmarks, storage, etc.  Some references from the past  Opera XSS found in opera:history  RCE exploit in opera:config (Kuza55 / Stefano Di Paola / Aviv Raff)  FF addons research with Nick Freeman  Multiple RCE exploits released in FF addons  XCS exploits are 100% reliable
  • 21. A bit about Maxthon  Developed by: Maxthon International (China)  Architecture  Supports Trident and Webkit layout engines  Focus on performance and extra features  Some stats - according to Maxthon  130 million users  Users spread over 120 countries  500,000,000 downloads in 2k10
  • 22. Maxthon – The bugs  Cross Context Scripting  about:history zone  Feed Reader (about:reader) and RSS Viewer  Bookmark Toolbar and Bookmark Sidebar  Incorrect Executable File Handling  Same-Origin Policy (SOP) Bypass  DNS Poisoning/MiTM – i.maxthon.com  Remote Code Execution possible in 5 different ways!
  • 23. Maxthon - XCS via location.hash  Injection via location.hash  Maliciouspage.html – performs redirection  Injected payload executes in about:history
  • 24. Maxthon XCS in RSS  Injection via <title>, <link>, <description> tags
  • 25. Maxthon - XCS in Bookmarks
  • 26. Maxthon – Further bugs  External Tools Direct Invokation  Maxthon can invoke executables  window.open("file://C:/windows/system/cmd32.exe");  pop up blocker -> but if user accepts, exe is called  SOP Bypass  Tested window.open() with following results:  From: http:// - window.open(‘file://….’) Prompts a popup blocker, if the user allows the pop up, the file:// window is opened  From: http:// - window.open(‘about://*’) spawns a new window  From: http:// - window.open(‘mx://res/*’) forbidden by SOP
  • 27. Maxthon – i.maxthon.com (1/2)  i.maxthon.com  sets interesting DOM objects  runtime  Maxthon
  • 28. Maxthon – i.maxthon.com (2/2)  Design Issues  i.maxthon.com = trusted domain  i.maxthon.com allows direct access to privileged APIs  No control on resolution of IP address  No use of SSL  MiTM Bug  DNS poisoning  Force resolution of i.maxthon.com to a controlled IP address  HTTP MiTM  i.maxthon.com served over HTTP – malicious proxy which alters page content  Other implications  XSS in real i.maxthon.com site
  • 29. DEMO - Maxthon multiple vulnerabilities
  • 30. Avant Browser – XCS & SOP Bypass  Severity:  Exploit: History Stealing, XSS, misc  Credits: Roberto Suggi Liverani  CVE: n/a  Status: Unpatched!  Vendor Response:  07/03/2012 - had to post 10 posts to a forum to get a contact!  14/03/2012 - reception of report confirmed but no further reply  14/03/2012 - chased them, no reply  03-05/2012 - 2 new releases following the report, one bug silently fixed  Approach: targeted - looking for injection points
  • 31. Avant Browser  Avant Browser - Avant Force (China)  Custom web browser application  Designed to expand services provided by IE  From FAQ: Is Avant Browser a secure browser? Yes, Avant Browser is secure. Since it's based on Internet Explorer, Avant Browser is as secure as Internet Explorer. Avant Browser supports all SSL secured websites. Avant Browser's encryption length is the same as Internet Explorer's.  Two versions: lite (only IE) & ultimate (IE, FF, Chrome)  More downloads than Chrome, IE and Opera in CNET
  • 32. A bit about Avant (1/3) Firefox wrapped version Arguments passed to firefox.exe Avant.exe - parent of firefox.exe
  • 33. A bit about Avant (2/3)  Interesting files  "C:Program FilesAvant Browserres" folder:  Observations  home.tpl is rendered at browser:home  rss.tpl is rendered at browser://localhost/lst?url/path/to/rss/feed  Such pages use privileged JavaScript function window.AFRunCommand()  Pages provided examples on how to call privileged functions and aided exploitation
  • 34. A bit about Avant (3/3)  Testing AFRunCommand()  Undocumented Avant browser function  Try{}/Catch{} no output  Bruteforce only option – passing a single parameter:  60003 - window.external.HistoryUrls() - [used in exploit]  60011 - prompt for download  10021 - add to ad block specified site  3 - spawns an empty tab  10010 - reloads the page  10013 - search for keywords  10014 - pop up blocker  10016 - download a video (argument passed as URL)  10017 - add task for download scheduler  10025 - search keywords
  • 35. Avant Browsers – The bugs  Same-Origin Policy (SOP) Bypass browser:home  Cross Context Scripting browser:home – Most Visited And History Tabs  Stored Cross Site Scripting Feed Reader (browser://localhost/lst?*)
  • 36. Avant Browser – Showcase  SOP Bypass - History Stealing
  • 37. Avant Browser – Showcase  XCS in browser:home – History Stealing  Injection via <title> HTML element  Cross Site Scripting Payload Rendered In browser:home Privileged Zone
  • 38. Avant Browser – Stored XSS via RSS  Injection via <title>, <link> and <description> tags
  • 39. DEMO – Avant Browser
  • 40. nsIScriptableUnescapeHTML.parseFragment() Bypass  Severity:  Impact: Remote Code Execution  Credits: Roberto Suggi Liverani  Status: Patched in FF 3.6.14, Thunderbird 3.1.8, and SeaMonkey 2.0.12  CVE: 2010-1585  Vendor Response:  Approach: investigating a Firefox addon developer’s doubt
  • 41. Some background  nsIScriptableUnescapeHTML.parseFragment()  Critical function used to filter and sanitise data  Mostly used in the context of filtering data in chrome:// priv zone  Recommended and deemed safe to use for addons devs  Wizzrss (FF addon) found to be vulnerable using a bypass
  • 42. Standard Case - Filtering  HTML Payload  Processed by parseFragment() becomes:  <script> is stripped out  Only HTML payload remains  Safe to append in chrome:// DOM
  • 43. Bypass Test Case  HTML payload  Processed by parseFragment() becomes:  With user interaction payload can be triggered in privileged browser zone – chrome://
  • 44. DEMO – Code Execution in WizzRSS FF addon - nsIScriptableUnescapeHTML.parseFragment() bypass demo video kindly provided by @0x7674 (Nick Freeman)
  • 45. Opera Use-After-Free < 11.52  Severity:  Exploit: Crash  Credits: Roberto Suggi Liverani  CVE: 2011-4152  Status: Patched in Opera 11.52  Vendor Response:  Recognised as a memory corruption bug  Not a security issue since no exploit is provided  But Opera kept asking for an exploit  Approach: using own fuzzers
  • 46. Opera Use-After-Free < 11.52  Simplified test-case  Clone, remove, append  Use of contenteditable attribute for <em> and <strong> lead to crash  Crash works if heap spray() occurs  Couldn’t find an exploit   Opera’s position: not exploitable
  • 47. DEMO - Opera – Use-After-Free Crash
  • 48. FF/Opera – XCS via bookmarks  Severity:  Impact: Code Execution  Credits: Roberto Suggi Liverani  Firefox - Status: Patched in FF 11  Bug reported by someone else  Opera - Status: Won’t fix  Opera Vendor Response:  Multiple exploit steps required – won’t fix  Approach: looking at injection in and from bookmarks
  • 49. In a few words  Ancient bug: reported in 2k5 by M. Krax  User is lured into bookmarking a:  Malicious javascript: URI + payload  User clicks on malicious bookmark  Focus on standard web page – Impact: UXSS  Focus on privileged browser zone – Impact: XCS  Many ways to fool users:  Security controls on status bar can be partially fooled  JavaScript can be compressed and obfuscated  Code can be hidden – e.g. Opera NULL byte issue in view source - @Agarri_FR
  • 50. DEMO - XCS via bookmarks Opera and Firefox Brendan Eich – 2k5 There’s nothing wrong with using javascript: URLs in chrome. What’s good for content is good for chrome, often enough.
  • 51. Conclusions  Disclosure Fail  Some browser vendors still do not understand how reporting and security disclosure works  Bug complexity vs. impact  Injection bugs are simple but impact can be significant  No need to find memory corruption bugs to achieve code execution  Delegated security  Presenting browsers as secure as IE or Chrome give false sense of security to end-users
  • 52. Special thanks  Blair Strang  Thanks to the SA team for inspiration  Advisories and exploit code for today’s demonstrations will be released in the near future  Thanks for coming along, and enjoy the rest of the con  If you have questions, come find us later on!  Roberto Suggi Liverani - @malerisch  http://blog.malerisch.net  Scott Bell – scott.bell@security-assessment.com
  • 53. References  cross_fuzz  http://lcamtuf.coredump.cx/cross_fuzz/  http://lcamtuf.blogspot.co.nz/2011/01/announcing-crossfuzz-potential- 0-day-in.html  Firefox Use-after-free  http://www.mozilla.org/security/announce/2012/mfsa2012-12.html  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0454  https://bugzilla.mozilla.org/show_bug.cgi?id=684555  Firefox nsiscriptable CVE  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585  Opera Use After Free  http://malerisch.net/docs/advisories/opera_use_after_free_crash_poc. html
  • 54. References  Cross Context Scripting in Firefox addons  http://malerisch.net/docs/cross_context_scripting/Cross_Context_Scrip ting_with_Firefox.html  Exploiting Firefox Extensions  http://www.slideshare.net/robertosl81/exploiting-firefox-extensions  WizzRSS – Security Advisory  http://www.security- assessment.com/files/advisories/WizzRSS_Firefox_Extension_Privileg ed_Code_Injection.pdf  Opera fail:  José Antonio Vázquez (@0xde1) - http://www.enred20.org/node/27  http://my.opera.com/securitygroup/blog/2011/10/19/about-the-svg-font- manipulation-vulnerability-that-was-fixed-in-11-52#comments
  • 55. References  Spoof Status Bar:  https://bug338459.bugzilla.mozilla.org/attachment.cgi?id=222524  Don't allow bookmarking an evaluated+loaded javascript: URL  https://bugzilla.mozilla.org/show_bug.cgi?id=371179  Opera Stored XSS  http://seclists.org/fulldisclosure/2008/Oct/394  Avant Forum Contact  http://forum.avantbrowser.com/viewtopic.php?f=21&t=31119&p=18272 4&hilit=report+security#p182724  Heap Spraying Demystified  https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial- part-11-heap-spraying-demystified/
  • 56. References  Blog – Roberto Suggi Liverani  http://blog.malerisch.net/  Twitter account - @malerisch  https://twitter.com/malerisch  Security-Assessment.com Research  http://www.security-assessment.com/page/archive.htm  Nick Freeman – Publications  http://atta.cked.me/publications