Module 3 - Attacks through Browsers and Add-on Modules Flashcards
Browser Vulnerabilities
- all have
- rely on users to upgrade to new versions and install patches
Browser Helper Objects (BHOs)
- extend functionality of browser, e.g. open PDFs, render graphics, play movies
- popular as targets
- not patched as often as browsers
Access via Browser
- intrusions launched through browsers and BHOs frequently have same level of permission as user account
Browser Intrusion Artifacts (4)
- internet cache
- account temp directory
- Windows registry
- Java Runtime Environment (JRE) files
Browser Attacks (method examples)
- exploit configurations
- change default home page
- install toolbar
IE Home Page Setting
\Software\Microsoft\Internet Explorer\Main\Start Page
IE Add-ons
Internet Options
Manage Add-Ons
Safari Extensions
Preferences
Extensions
Java Runtime Environment (definition)
runtime portion of Java software (only thing needed to run Java via web browser)
JRE (parts)
- Java Virtual Machine (JVM)
- Java platform core classes
- Java platform libraries (supporting libraries)
Java plug-in (definition)
- component of JRE
- allows applets written in Java to run inside browsers
- not standalone program -> cannot be installed separately.
XSS
Cross Site Scripting (both client and server)
- loading attacked, 3rd party web app from unrelated attack site -> in manner that executes fragment of JavaScript prepared by attacker.
- now also other modes of code injection, including ActiveX, Java, VBScript, Flash, or HTML scripts
XSS Persistent
- less common
- data (from attacker) saved by server and permanently displayed on “normal” pages without proper HTML escaping
XSS non-persistent
- more common
- data provided by web client (HTML query parameters or form submissions) used by server-side scripts to parse and display results to user without properly sanitizing the request.
Artifacts for XSS
- emails (for links)
- web page caches (for links)
- web server logs