Q

What are the basics of a Web browser exploit?

John Strand explains how attackers target a flaw in either the browser or in an application that the browser calls to process a Web request.

Can you explain the basics of a Web browser exploit, and can you provide an example of how one can enable an attacker to infect an enterprise system?
Let's first look at a class of threats where the attacker targets a vulnerability in either the browser or in an application that the browser calls to process a Web request. For example, an attacker could use the mozilla_compareto module -- a Metasploit module that builds on the research of Aviv Raff -- to have their system act as a Web server. When an unsuspecting victim connects to the evil attacker's site, it launches an attack against the browser itself, creating a shell on the target system for the malicious hacker.

An attacker can also target an application that the browser uses to properly render a website. For example, an attacker can attack RealPlayer, QuickTime, or even the victim's antivirus program.

Next, an attacker can submit a malicious Javascript request to the browser, a technique also known as cross-site scripting (XSS) or cross-site request forgery (XSRF). In addition to XSS and XSRF, a creative attacker can gain access to a victim's browsing history, or what is currently in the victim's clipboard. The contents can include the user's password or credit card numbers. The tool that best articulates these attacks is the Browser Exploitation Framework by Wade Alcorn at bindshell.net.

Defense against these types of threats should always focus on educating users not to click on links from strangers and to be wary of certificate errors. Security managers should spend some time considering which websites users need to go to do their jobs. Also consider developing a white-list approach to user Web access. The filtering would permit users to only access websites that are approved, while blocking everything else.

More information:

  • Researchers at this year's Black Hat 2008 conference revealed how to use the browser to elude Vista memory protections.
  • Get the latest browser security news and expert advice.
  • This was first published in October 2008
    This Content Component encountered an error

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close