Presented at
Kiwicon 2038AD: The Dystopic Future is Now (2018),
Nov. 17, 2018, 10:45 a.m.
(45 minutes).
AppSec is often very heavily focused on pre-exploitation. Frameworks like BeEF break this norm a little and can be used as tools to move laterally from the browser, to implant malware on adjacent machines.
Unfortunately, performing network reconnaissance with JavaScript becomes tricky if the victim doesn't keep the tab open for long.
This presentation will discuss relatively new features of JavaScript that have made it easier for sophisticated threat actors to craft JavaScript payloads that target internal network vulnerabilities.
We'll also show new reconnaissance techniques traditionally used by red teams, post-malware implant, that can be used to get a foothold onto a network from a browser, pre-malware implant.
This presentation will thread together the following techniques to highlight how HTML and JavaScript are more dangerous than ever:
CSRF to gain footholds into internal networks
WebRTC for internal network reconnaissance
Service Workers to help reduce the likelihood of arbitrary JavaScript being detected or halted
Bug Bounty programs as a means of exploitation
Certificate Transparency and other modern sub-domain reconnaissance techniques to refine where to target your CSRF payloads
Looking for vulnerabilities in open source internal tools is much easier to do than looking for vulnerabilities in edge facing assets
We'll also show some real examples of this, crafting external payloads that target internal assets at large companies, and we'll show how responsible disclosure for intranet facing bugs typically gets resolved.
Presenters:
-
Christian Frichot / xntrik
as Christian 'xntrik' Frichot
Christian 'xntrik' Frichot is an application security person who spends his free time trying to avoid computers. Currently working to secure self-driving cars in SF, Christian used to contribute a lot to BeEF, and has helped put together words for The Browser Hacker's Handbook. He's also been fortunate enough to present at wonderful events such as Kiwicon, DEFCON, CactusCon & BSidesSF
-
Dylan Ayrey
Dylan is a security engineer, who in his free time authors lots of open source projects, such as truffleHog. He graduated college in 2015 and has been working in security ever since. Dylan has presented on a number of topics from lingering TLS certificate issues, to finding secrets, at conferences such as Toorcon, DEFCON, BSidesSF.
Similar Presentations: