SlideShare a Scribd company logo
Introduction to desktop browser add-ons.
Explanation the process of moderation.
Most frequent attack vectors and good
practices for developers.
Wojtek Zieliński
Browser add-ons
Themes
Extensions
Browser themes
persona.ini
Browser themes
Browser extensions
Html
CSS
JavaScript
Browser extensions
Background script (UI, app state, sync)
Content script (context, DOM, r/w, limitations)
Popups
Options
Speed Dials
Sidebars
./manifest.json (metadata)
Moderation process
1. Check metadata: summary, description, category,
service, support, source code, icons, screenshots, etc.
2. Acceptance criteria:
– Must perform as described
– Screenshots, description, category
– Private information
– Remote code execution
– Obfuscation
3. Code review
Moderation process /
Static code review
New and upgrades
Redundant files, permission, comments
• Code performance
• Thieving data
• Proposing fix
• Bad programming techniques, attacks, malware code
• Cooperation
Additional testing
Automation
Vulnerability in extensions
– External scripts (http, m-i-m)
– Parsing JSON using eval()
– Passing strings to setTimeout() and setInterval()
– Inserting untrusted data into Event Handler
– Using InnerHTML
– Bugs in third party libraries jQuery
– A bunch of other XSS attacks
Vulnerability in extensions /
External script injection
Vulnerability in extensions /
Parse JSON using eval()
1. eval(json string) 2. JSON.parse(json string)
3. eval(JS string) 4. JSON.parse(JS string)
Vulnerability in extensions /
Event Handlers
Vulnerability in extensions /
innerHTML
Vulnerability in extensions /
data-target
Tahnk You!

More Related Content

PDF
[OWASP Poland Day] Web App Security Architectures
PPTX
[OWASP Poland Day] Application frameworks' vulnerabilities
PPTX
[OWASP Poland Day] Application security - daily questions & answers
PDF
Browser Exploit Framework
PPTX
Rapid Android Application Security Testing
PPTX
ASP.NET security vulnerabilities
PDF
Finacle - Secure Coding Practices
PPTX
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
[OWASP Poland Day] Web App Security Architectures
[OWASP Poland Day] Application frameworks' vulnerabilities
[OWASP Poland Day] Application security - daily questions & answers
Browser Exploit Framework
Rapid Android Application Security Testing
ASP.NET security vulnerabilities
Finacle - Secure Coding Practices
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application

What's hot (20)

PDF
Javacro 2014 Spring Security 3 Speech
PPT
Implementing application security using the .net framework
PPTX
Uniface Web Application Security
ODP
Introduction to OWASP & Web Application Security
PPTX
Advanced Client Side Exploitation Using BeEF
 
PPT
Secure code practices
PPTX
Cyber ppt
PDF
OWASP Secure Coding Practices - Quick Reference Guide
PPTX
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
PPTX
[Wroclaw #2] Web Application Security Headers
PPTX
Microsoft Fakes, Unit Testing the (almost) Untestable Code
PDF
A Scalable Client Authentication & Authorization Service for Container-Based ...
PDF
[OWASP Poland Day] A study of Electron security
PPT
Why You Need A Web Application Firewall
PPTX
Spring Security
PPSX
Scaling-up and Automating Web Application Security Tech Talk
PPTX
[Wroclaw #5] OWASP Projects: beyond Top 10
PDF
I got 99 trends and a # is all of them
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
PDF
Secure coding-guidelines
Javacro 2014 Spring Security 3 Speech
Implementing application security using the .net framework
Uniface Web Application Security
Introduction to OWASP & Web Application Security
Advanced Client Side Exploitation Using BeEF
 
Secure code practices
Cyber ppt
OWASP Secure Coding Practices - Quick Reference Guide
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
[Wroclaw #2] Web Application Security Headers
Microsoft Fakes, Unit Testing the (almost) Untestable Code
A Scalable Client Authentication & Authorization Service for Container-Based ...
[OWASP Poland Day] A study of Electron security
Why You Need A Web Application Firewall
Spring Security
Scaling-up and Automating Web Application Security Tech Talk
[Wroclaw #5] OWASP Projects: beyond Top 10
I got 99 trends and a # is all of them
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Secure coding-guidelines
Ad

Similar to [Wroclaw #6] Introduction to desktop browser add-ons (20)

PPT
Web 2.0 Hacking
PPT
MokE: a tool for Mobile-ok evaluation of Web Content
PPT
SynapseIndia php web development
PPTX
Altitude SF 2017: Security at the edge
ODP
Performance Tune Up for Web Developers
PPTX
Cos 432 web_security
PPT
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
PDF
Thug: a new low-interaction honeyclient
PDF
Threat_Modelling.pdf
PDF
Internet Explorer 8
PDF
OORPT Dynamic Analysis
PPT
Hacking web applications
PDF
Securing DevOps through Privileged Access Management
PDF
Locking the Throne Room - How ES5+ might change views on XSS and Client Side ...
PDF
XCS110_All_Slides.pdf
PDF
Thick Application Penetration Testing - A Crash Course
PPTX
Detection of webshells in compromised perimeter assets using ML algorithms
PDF
Thick Application Penetration Testing: Crash Course
PDF
Fluturas presentation @ Big Data Conclave
PDF
Web Security - Introduction v.1.3
Web 2.0 Hacking
MokE: a tool for Mobile-ok evaluation of Web Content
SynapseIndia php web development
Altitude SF 2017: Security at the edge
Performance Tune Up for Web Developers
Cos 432 web_security
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
Thug: a new low-interaction honeyclient
Threat_Modelling.pdf
Internet Explorer 8
OORPT Dynamic Analysis
Hacking web applications
Securing DevOps through Privileged Access Management
Locking the Throne Room - How ES5+ might change views on XSS and Client Side ...
XCS110_All_Slides.pdf
Thick Application Penetration Testing - A Crash Course
Detection of webshells in compromised perimeter assets using ML algorithms
Thick Application Penetration Testing: Crash Course
Fluturas presentation @ Big Data Conclave
Web Security - Introduction v.1.3
Ad

More from OWASP (20)

PDF
[OPD 2019] Web Apps vs Blockchain dApps
PDF
[OPD 2019] Threat modeling at scale
PDF
[OPD 2019] Life after pentest
PDF
[OPD 2019] .NET Core Security
PDF
[OPD 2019] Top 10 Security Facts of 2020
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PDF
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PPTX
[OPD 2019] Inter-application vulnerabilities
PDF
[OPD 2019] Automated Defense with Serverless computing
PDF
[OPD 2019] Advanced Data Analysis in RegSOC
PDF
[OPD 2019] Attacking JWT tokens
PDF
[OPD 2019] Rumpkernels meet fuzzing
PDF
[OPD 2019] Trusted types and the end of DOM XSS
PDF
[Wroclaw #9] The purge - dealing with secrets in Opera Software
PDF
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
PDF
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
PDF
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
PDF
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Threat modeling at scale
[OPD 2019] Life after pentest
[OPD 2019] .NET Core Security
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Attacking JWT tokens
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Trusted types and the end of DOM XSS
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts

Recently uploaded (20)

PPTX
innovation process that make everything different.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Digital Literacy And Online Safety on internet
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Internet___Basics___Styled_ presentation
PPT
tcp ip networks nd ip layering assotred slides
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
innovation process that make everything different.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
The Internet -By the Numbers, Sri Lanka Edition
Digital Literacy And Online Safety on internet
RPKI Status Update, presented by Makito Lay at IDNOG 10
Tenda Login Guide: Access Your Router in 5 Easy Steps
Internet___Basics___Styled_ presentation
tcp ip networks nd ip layering assotred slides
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Cloud-Scale Log Monitoring _ Datadog.pdf
Power Point - Lesson 3_2.pptx grad school presentation
Decoding a Decade: 10 Years of Applied CTI Discipline
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
WebRTC in SignalWire - troubleshooting media negotiation
Paper PDF World Game (s) Great Redesign.pdf
Introuction about WHO-FIC in ICD-10.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Design_with_Watersergyerge45hrbgre4top (1).ppt
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Introduction about ICD -10 and ICD11 on 5.8.25.pptx

[Wroclaw #6] Introduction to desktop browser add-ons