Browsing: What Could Go Wrong?
There's so much literature about client side attacks, but most of the focus is usually about classical malware attacks, exploiting software vulnerabilities.
Malicious scripts happen to be executed every day by thousands of people and most of the times Malware/Virus/Malvertising try to exploit vulnerabilities or to lure the user to install software on his own machine with the intent of staying undetected as much as possible in order to do its criminal business.
That's what AntiMalware/Virus/[...] are for.
It's the principle of minimum energy: usual malware wants comfortable, smooth, local execution.
However, there's quite a number of alternative attacks on the client side, with minimal fingerprint that tend to drag less attention and that might go unnoticed on several environments.
Indeed there's a history of such alternative attacks as:
- Local Port Scan: Impact: Information Gathering which could be used to perform further client side attacks (Malware) or to have a better unique user profile (Advertising/RiskAnalysis).
- Cross Protocol attacks: Impact: according to the protocol there might be an abuse of specific features. Such as SMTP abuse etc.
- DNS rebinding: Impact: SOP bypass resulting in reading sensitive information of internal network servers.
which are not news at all. They are, indeed, quite old attacks that are still as reliable as difficult to completely "fix" by browser vendors because they abuse core features of the Web ecosystem.
Behave! A Monitoring Extension for pages acting as "bad boi"
With those attacks in mind, we thought that, by taking advantage of the browser API at extension layer, a browser extension might help monitoring HTML pages behavior.
That's Behave!
Available as an extension for:
It monitors and warn if a web page performs any of following actions:
- Browser based Port Scan
- Access to Private IPs
- DNS Rebinding attacks to Private IPs
Here's Behave! pointing its finger to a malicious page hosted by at.tack.er host performing access to local IPs:
Behave! Future Plans
There's a quite a bunch of stealth&malicious client side techniques that could be abused at several levels of security that might be monitored by Behave! in the future.
No comments:
Post a Comment