Web Security

Postcards from Vegas

August 29th, 2017 | By Jscrambler | 4 min read

At this time, you should already know that Jscrambler attended Black Hat USA 2017 and DEF CON 25 between 25 - 30 July 2017, in Las Vegas, US.

It seemed almost inevitable to us to write about that, sharing some insights from both events, as we had a blast!

Black Hat USA

In its 20th year, Black Hat is the world’s leading information security event, providing attendees with the very latest trends in research, web development, and security.

Black Hat USA 2017 kicked off with four days of technical Training (July 22-25) followed by two days of conferences (July 26-27) including Briefings, Arsenal, Business Hall, and much more.

black-hat-usa-2018As 'Visibility' was one of the five words that defined this year's conference, we recommend that you check the best hacks from this security conference that Wired compiled: Security This Week: The Very Best Hacks From Black Hat and DEFCON.

“The good guys have got to learn it because the bad guys already do,” says Dan Haagman, co-founder of Not So Secure, which ran one of the training courses at the event.

astronaut-at-black-hat-2018BBC sent a security researcher to one of the courses held in Las Vegas to find out more.

DEF CON 25

DEF CON needs no introduction whatsoever. In its 25th edition, the event is still super exciting and it's composed and supported by a vast community of volunteers and enthusiasts who are passionate about improving our digital world. Let us highlight some of the talks that caught our attention:

The Brain’s Last Stand by Garry Kasparov

A quite philosophical talk but entertaining on the struggle of man against the AI based on the personal battles of Garry Kasparov. He gave interesting details on how his preparation changed from game to game, how he studied computer limitations, and how he tried to balance the scale (eg, having access to all games the computer played). His talk can be watched below.


### - Exploiting Continuous Integration (CI) and Automated Build systems by spaceB0xx.

A Pull Request (PR) can trigger a build in Continuous Integration (CI) but if that PR includes changes in the build process settings, it can lead to Remote Code Execution (RCE). The speaker researched this topic using public repositories in Github (and therefore was expelled).

The repositories used Travis as CI (common) and were configured to do build during the PR ( a common practice to know if the PR breaks the build). It was given as a critical example, the case of the repositories that include dockerfile, allowing image modification, and access to the network - in containers everything runs as root, allowing access to the internal network, full control over the image or SSH key leak.

Since CI service providers use a hosting infrastructure, the speaker realized that they could still create new instances, launch new processes, etc, through the before_install hook.

While doing the research, he automated the entire process and eventually created a tool called CIDER: Continuous Integration and Deployment Exploiter.

Game of Chromes: Owning the Web with Zombie Chrome Extensions by Tomer Cohen

This talk was about the Wix.com use case (April 2016).

At some point, they noticed a peak in the number of records and realized the existence of a suspicious pattern: each record completed the process and published a site in only 10.

The target page of the "attack" was the registration form, so they noticed it was not a CSRF attack. They investigated further and realized that it was a botnet, admitting that it could have passed the mechanisms implemented to block this type of traffic.

Research showed later that it was an extension of Chrome (Viad30 Unlocker) since the pages that were created on Wix.com had a link to the extension. You can check HackRead's feature regarding this use case.

The modus operandi of the extension was as described below:

  • Inject code into Facebook pages/tabs/windows

  • Open in a hidden iframe the Wix.com registration form;

  • Simulate the click on the "Register with Facebook" button;

  • Publish the site on Wix.com

  • Send a message to all Facebook Messenger contacts with the link to the newly created site on Wix.com

  • The sites published on Wix.com served to disseminate the Chrome Extension;

  • By posting a site for each "infected" user, the attacker could get a new (different) URL to send to the contacts, thus preventing Facebook from blocking the URL, since it wasn't unique.


The rest of the presentation was about the potential of a Browser Extension. It also demonstrated how vulnerabilities can be exploited using other extensions that the user may have installed, such as:

  • Adobe Acrobat (30M installs, XSS was found in January, 2016)

  • AVG (9M installs, XSS was found in December 2015)


If you want to deep dive into the agenda, be sure to follow all DEF CON updates on their official Twitter. Enjoy, share, and... See you next year!

Jscrambler

The leader in client-side Web security. With Jscrambler, JavaScript applications become self-defensive and capable of detecting and blocking client-side attacks like Magecart.

View All Articles

Must read next

News

Recapping a Hot Week in Vegas

Last week, Jscrambler attended the two biggest cyber security events in the world: Black Hat USA and DEF CON. Read all about our hot adventure.

August 14, 2018 | By Jscrambler | 3 min read

Jscrambler

Black Hat USA 2018: Know Before You Go

August brings us yet another Black Hat USA, the world's leading information security event. Here are some facts to know before you go (and meet us there!).

July 30, 2018 | By Jscrambler | 3 min read

Section Divider