This week during the SANS London 2010 conference I presented the second part of the web browser exploitation series, "Browser Exploitation for Fun and Profit Reloaded". This presentation is a follow up of the previous "Browser Exploitation for Fun and Profit" one from last month, and builds on top of the penetration testing setup previously described based on Samurai WTF v0.9, plus BeEF v0.4.0.3, and Metasploit v3.5.x.
This second part provides penetration testers with new tools, ideas, and techniques to demonstrate the impact of XSS vulnerabilities on the client side (but not only), with a specific focus on the top vulnerable (client-side) applications during the first three quarters of 2010: web browsers and their associated plug-ins.
Download: PDF
Source: http://blog.taddong.com
Volut-ID | World News Articles
All news of interest and can provide an info for you, and so can assist in the search for new news.
About news gadgets, mobile phones
info about the latest mobile phone, from news, features, and the most mobile phone models in search of the world.
Browser Exploitation for Fun & Profit Reloaded
Related Post
Papers
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- 2011 Data Breach Investigations Report
- 2011 Data Breach Investigations Report
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Exposing the Lack of Privacy in File Hosting Services
- Exposing the Lack of Privacy in File Hosting Services
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- HTTP Geolocation
- HTTP Geolocation
- HITB Magazine Issue 005 released
- HITB Magazine Issue 005 released
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- Trustwave's Global Security Report 2011: Web Application Risks
XSS
- Twitter XSS
- AntiXSS v.4.0 Released
- AntiXSS v.4.0 Released
- Barracuda Networks website Hacked
- Barracuda Networks website Hacked
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- Preventing XSS Attacks
- Preventing XSS Attacks
- OWASP AntiSamy v.1.4.4 Released
- OWASP AntiSamy v.1.4.4 Released
- My Opera XSS
- My Opera XSS
- XSSer v1.5 beta Released
- XSSer v1.5 beta Released
- DOMXSS Scanner
- DOMXSS Scanner
- XSS Rays - Google Chrome Browser Extensions
- XSS Rays - Google Chrome Browser Extensions
- XSS Street-Fight: The Only Rule Is There Are No Rules
- XSS Street-Fight: The Only Rule Is There Are No Rules
- New XSS on Barack Obama website
- New XSS on Barack Obama website
- OWASP AntiSamy v1.4.2 Released
- OWASP AntiSamy v1.4.2 Released
Browser
- Nuf-Fuzzer v.0.1 Pre-release
- Google Chrome Pwned
- Google Chrome Pwned
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- Comitari : Web Protection Suite
- Comitari : Web Protection Suite
- Critical vulnerability in Opera web browser
- Critical vulnerability in Opera web browser
- XSS Rays - Google Chrome Browser Extensions
- XSS Rays - Google Chrome Browser Extensions
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- BeEF v0.4.2.1 released
- BeEF v0.4.2.1 released
- Websecurify 0.8Beta1 released
- Websecurify 0.8Beta1 released
- WEB BROWSER SECURITY SOCIALLY-ENGINEERED MALWARE PROTECTION
- WEB BROWSER SECURITY SOCIALLY-ENGINEERED MALWARE PROTECTION
- SDRF Vulnerability in Web-Applications and Browsers
- SDRF Vulnerability in Web-Applications and Browsers
No response to “Browser Exploitation for Fun & Profit Reloaded”
Leave a reply