SECOPS 6: Common Attack Vectors Flashcards
Goal of Obfuscating javascript code
Protect IP of developers
eval()
Sign of JavaScript obfuscation
DOM
HTML Model for accessing web-based documents
jsunpack or jsdetox
Model to decode obfuscated javascript
JavaScript key variable
Always the first part of a string
‘+”"”)())();’
JavaScript string always ends with this.
DEP
Prevents the use of stack memory space for execution
DEP circumvented by…
heap memory
ASLR bypassed by…
egg hunting (executing code stub that ID’s memory location)
Shellcode stage payload
Buffer overflow to acquire memory space
Unstaged payload
No space limitations. Payload resides with a single memory space.
Way to detect shellcode on the network
Detect a sequence of NOP instructions.
NOP Sled
Sequence of NOP instructions that precedes shellcode.
NOP instructions do what?
Nothing, then move to the next instruction until they find the shellcode.
Snort and Bro use generic signatures to detect…
Shellcode