SlideShare ist ein Scribd-Unternehmen logo
1 von 71
Downloaden Sie, um offline zu lesen
Ethical Hacking and
CountermeasuresCountermeasures
Version 6
Module LIIIModule LIII
Hacking Web Browsers
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://infotech.indiatimes.com/
Module Objective
• Introduction to Web Browsers
This module will familiarize you with:
• Hacking Firefox
• Firefox Security
• Hacking Internet Explorer
I t t E l S it• Internet Explorer Security
• Hacking Opera
• Security Features of Opera
• Hacking Safari• Hacking Safari
• Hacking Netscape
• Security And Privacy Features
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Introduction to
Web Browsers
Hacking Opera
Web Browsers
Hacking Firefox Security Features of Opera
Hacking SafariFirefox Security
Hacking Netscape
Hacking SafariFirefox Security
Hacking NetscapeHacking Internet Explorer
S it A d P i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Internet Explorer Security
Security And Privacy
Features
Introduction
M t f th l id W b b th it lMost of the people consider Web browser as the vital
key for interacting with the Internet, which connects
them to global web sites and helps them to consume
online services and provides everything from booking
flights to banking services to online shopping
This reality makes browsers a key tool when
evaluating the security experience of users as theg y p
browser interprets Web content and programs
delivered from around the world
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How Web Browsers Work
The browser requesting a page
The server sending back the requested page
System running
web browser such
as Mozilla, IE.
Server
machine
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How Web Browsers Access
HTML DocumentsHTML Documents
When an URL is entered in the URL field of
browser the browser goes through the
following three basic steps:
• The browser determines what protocol to use
• It looks up and contacts the server at the address specified
• The browser requests the specific document (including its path
) f hstatement) from the server computer
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Protocols for an URL
The following table shows some of the other protocols that can be
part of an URLpart of an URL
Protocol Accesses
h // dhttp:// HTML documents
https:// Some "secure" HTML documents
file:// HTML documents on your hard drive
ftp:// FTP sites and files
gopher:// Gopher menus and documents
news:// UseNet newsgroups on a particular newsnews:// UseNet newsgroups on a particular news
server
news: UseNet newsgroups
mailto: E-mail messages
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g
telnet: Remote Telnet (login) session
H ki Fi fHacking Firefox
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firefox Proof of Concept
Information Leak VulnerabilityInformation Leak Vulnerability
Firefox leaks information that can allow an attacker to load anyy
JavaScript file on a machine
Technically it is a chrome protocol directory transversalTechnically, it is a chrome protocol directory transversal
When a chrome package is “flat” rather than contained in a .jar, the
di ecto t a e sal allo s the e tensions di ecto to escape anddirectory traversal allows the extensions directory to escape and
files to be read in a predictable location on the disk
A visited attacking page is able to load images, scripts, orA visited attacking page is able to load images, scripts, or
stylesheets from known locations on the disk
Attackers may use this method to detect the presence of files which
i k i f i b hi h li i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
may give an attacker information about which applications are
installed
Firefox Spoofing Vulnerability
A flaw has been discovered in Firefox which could be used to trick a user into
b li i th t th t ll i iti t t d b itbelieving that they are actually visiting a trusted web site
Mozilla’s latest version fails to sanitize single quotation marks and spaces in theg q p
"Realm" value of an authentication header
This makes it possible for an attacker to create a specially crafted Realm valueThis makes it possible for an attacker to create a specially crafted Realm value
which will look as if the authentication dialog came from a trusted site
E l i i hi l bili k i h b bl l iExploiting this vulnerability, an attacker might be able to lure a user into
providing his/her username, password, or other sensitive information
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Password Vulnerability
Fi f i dFirefox contains a password management
vulnerability that can allow malicious Web sites
to steal user passwords
If you have JavaScript enabled and
allow Firefox to remember yourallow Firefox to remember your
passwords, you are at risk from this flaw
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Concerns With Saving Form Or
Login DataLogin Data
Firefox has the ability to store commonly used form elements and login
credentialscredentials
To access the settings for form or login data, open the Options window, and
access the Privacy settings (Tools ->Options)
To prevent Firefox from saving any sort of form data in the future, uncheck
“Save information I enter in web page forms and the Search Bar”
To prevent Firefox from saving any login credentials, uncheck “Remember
Passwords”
Password Manager allows for fine-grained management of passwords
Password Manager allows to view any passwords that are previously saved by
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Password Manager allows to view any passwords that are previously saved by
Firefox
Cleaning Up Browsing History
Firefox stores records the browsingg
history in three ways:
HiHistory:
A list of visited sites
Download History:
A list of files downloaded
Cache:
A temporary storage area for web
page files
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
page files
Cookies
Cookies are little pieces of information that are left on computer by web sites
Cookies have legitimate uses
Message boards use them so that a forum member does not have to log in every single time
he/she visits
Merchant sites use cookies to keep track of what is being added to shopping carts
Cookies can also store a database session or some other piece of information that allows the
web site to know what has transpired previously
“For the originating web site only” feature should probably be turned on this will block web
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
For the originating web site only feature should probably be turned on, this will block web
bugs from setting cookies and will allay many privacy concerns
Internet History Viewer:
Cookie ViewerCookie Viewer
Cookie Viewer discovers the information that web sites store on usersCookie Viewer discovers the information that web sites store on users
computer
It automatically scans your computer, looking for "cookies" created by
Microsoft's Internet Explorer, Netscape's Navigator, and Mozilla
Project's FireFox web browsers
It can also delete any unwanted cookies stored by these browsers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cookie Viewer: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firefox SecurityFirefox Security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Blocking Cookies Options
Firefox can flush cookies every time the
browser closes down or users can set the datebrowser closes down, or users can set the date
on which they want the cookies to expire
Lik J S i t ki b di bl dLike JavaScript, cookies can be disabled
entirely but many sites require cookies to
function properly
It is easy enough to set few sites as exceptions
This involves low-maintenance and is less
intrusive than addressing each individual
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
intrusive than addressing each individual
cookie specifically
Tools For Cleaning Unwanted
CookiesCookies
There is a built-in tool for cookie removal in FirefoxThere is a built in tool for cookie removal in Firefox
There is a problem to clear out some cookies and save some othersThere is a problem to clear out some cookies and save some others
The sites for which the cookies are to be saved must be highlightedThe sites for which the cookies are to be saved must be highlighted
“Don’t allow sites that set removed cookies to set future cookies” must be
selected before clearing cookies
CookieCuller is a modified version of the Cookie Manager built into the Firefox
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CookieCuller is a modified version of the Cookie Manager built into the Firefox
browser
Tool: CookieCuller
CookieCuller protects the wanted cookies
and quickly delete the unwantedand quickly delete the unwanted
Gives quick access to the CookieCuller
dialog using a custom toolbar buttondialog using a custom toolbar button
Optionally deletes unprotected cookies on
bbrowser startup
Right Click on any toolbar icon and selectg y
Customize
Drag the CookieCuller icon to a position on
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Drag the CookieCuller icon to a position on
the toolbar where it needs to be placed
CookieCuller: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Getting Started
To edit the settings for Mozilla Firefox, select Tools, then Optionsg p
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Privacy Settings
Under privacy section there is an
option for setting cookies
Cookies can be accepted for few sites
and rest will be left by mentioning
sites address in Exceptionssites address in Exceptions
Cookies can be kept un till they expire
or browser is running
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security Settings
Under security settings passwords
settings can be changed
Passwords can be remembered by
browser with some exceptionsp
Master password is also set toMaster password is also set to
browser in order to manage
passwords
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Content Settings
Pop ups, images and java script
can be enabled and disabled
d b i iunder content tab in options
Pop ups and images can be
enabled for few sites with
exceptionsexceptions
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Clear Private Data
Clear private data option is
selected under tools tab in menu
barbar
It will clear all the private data
including browsing history,
cookies cache passwords and allcookies, cache, passwords and all
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Mozilla Firefox Security Features
Firefox includes built-in controls to block pop-upsFirefox includes built in controls to block pop ups
Firefox does not support VBScript and ActiveX Controls, which are often the
source of attacks and vulnerabilities within IE
Way of handling secure Web sites, such as e-commerce or online banking sites
When visiting a secure site Firefox highlights the address bar's URL in yellow and shows the Lock• When visiting a secure site, Firefox highlights the address bar s URL in yellow and shows the Lock
icon
• If you click the Lock icon, you can review the site's security information and decide whether to
continue
• The domain name of the site you are visiting is also listed in the right-hand corner of securey g g
windows, so you know the true source of every page
• A criminal hacker might be able to spoof the location bar address, but he/she will not be able to
spoof this secondary address display
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Adblock extension blocks flash advertising from Web sites
Hacking Internet ExplorerHacking Internet Explorer
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Redirection Information
Disclosure VulnerabilityDisclosure Vulnerability
The vulnerability is caused due to an error in the handling of
di i f i h h " h l " h dlredirections for URLs with the "mhtml:" URI handler
This can be exploited to access documents served from another webp
site
Attacker can disclose potentially sensitive information using thisp y g
vulnerability
S l iSolution:
• Apply patches
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Window Injection Vulnerability
This vulnerability can be exploited by an
attacker to spoof the content of websites
The problem is that a website can inject
content into another site's window if the
t t f th i d i ktarget name of the window is known
Solution:Solution:
• Do not browse untrusted sites while browsing
trusted sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
trusted sites
Internet Explorer SecurityInternet Explorer Security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Getting Started
To get started, Tools > Internet Options
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security Zones
Click on the Security tab that shows the
various IE security zonesvarious IE security zones
Internet zone is where all sites initially
start outstart out
High security setting should be applied for
Internet zoneInternet zone
By selecting the High security setting,
several features including ActiveX Activeseveral features including ActiveX, Active
scripting, and Java will be disabled
With these features disabled, the browser
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
will be more secure
Custom Level
Clicking on the Custom Level buttonClicking on the Custom Level button
displays more granular control over
what features are allowed in the zone
Default values for the High security
setting can be selected by choosing High
and clicking the Reset button to apply
the changesthe changes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Trusted Sites Zone
Trusted sites are a security zone forTrusted sites are a security zone for
web sites which are securely
designed and contain trustworthy
content
They can be added by clicking sites
b ttbutton
It i d d t t thIt is recommended to set the
security level for the Trusted sites
zone to Medium when Internet
zone is set to high
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g
Privacy
In the Privacy tab, settings for
configuring cookies are made
It is recommended to select the
Advanced button and select
Override automatic cookie handlingOverride automatic cookie handling
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Overwrite Automatic Cookie
HandlingHandling
Select Prompt for both first and third-party cookies; this will
prompt each time a site tries to place a cookie on computerprompt each time a site tries to place a cookie on computer
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Per Site Privacy Actions
Cookie settings for specific sites
b d b l hcan be managed by selecting the
"Sites" button
Sites can be added and removed
Bottom section of this window
will specify the domain of the site
It specifies action to be taken
when that site wants to place a
ki h
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
cookie on that computer
Specify Default Applications
Under the Programs tab,
speciation can be made for
default applications for viewingdefault applications for viewing
Web sites, e-mails, and other
network related tasks
Internet Explorer can prevent
showing the message asking to
be the default Web browserbe the default Web browser
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Internet Explorer Security
FeaturesFeatures
1 • Default protection from potentially dangerous Active X controls
2 • Per-zone control of Active X opt-in
3 • Site and zone locking for Active X controls
4 • Protection against phishing
5 • Cross-domain security
6 • Locked down security zones
7 • Better SSL/TLS notification and digital certificate info
8 • Privacy protection features
9 • Has Address bars
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
10 • International character alert
Hacking OperaHacking Opera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
JavaScript Invalid Pointer
VulnerabilityVulnerability
A vulnerability has been reported in Opera, which
potentially can be exploited by malicious people to
compromise a users system
It is caused due to an unspecified error when processing
JavaScript code and can result in a virtual function call usingJavaScript code and can result in a virtual function call using
an invalid pointer
This can be exploited to execute arbitrary code by tricking
the user into visiting a malicious website
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
BitTorrent Header Parsing
VulnerabilityVulnerability
The vulnerability is caused due to Opera using already freed memory whenThe vulnerability is caused due to Opera using already freed memory when
parsing BitTorrent headers and can lead to an invalid object pointer being
dereferenced
This can be exploited to execute arbitrary code, when the user is tricked into
clicking on a specially crafted BitTorrent file and then removes it via a right-
click from the download panep
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Torrent File Handling Buffer
Overflow VulnerabilityOverflow Vulnerability
The vulnerability is caused due to a boundary error in the
handling of certain keys in torrent files
It can be exploited to cause a stack-based buffer overflow
when a user right-clicks a malicious torrent entry in thee a use g t c c s a a c ous to e t e t y t e
transfer manager
Successful exploitation allows execution of arbitrary code
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security Features of Operay p
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security and Privacy Features
EncryptionEncryption
• Opera supports Secure Socket Layer (SSL) versions 2 and 3, and TLS and
offers automatic 256-bit encryption5 b yp
Cookie control
• Opera gives detailed control of what cookies to accept and reject, such as
allowing for different set-ups for different servers
Fraud protection
O d d f d t ti t t i t b it th t t
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Operas advanced fraud protection protects user against web sites that try
to steal personal information
Security and Privacy Features
(cont’d)(cont d)
Delete private data
• Opera can be configured to clear the history and cache
when exiting, to protect your privacy. Any kind of private
data can easily be erased
Security bar
• Opera displays security information inside the address bar.
By clicking on the yellow security bar user can get access to
i f ti b t th lidit f th tifi t
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
more information about the validity of the certificate
H ki S f iHacking Safari
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Safari Browser Vulnerability
The Safari browser automatically opens “safe” files such as movies, pictures,y p , p ,
sounds, PDFs, text files, disk images and other archived files
It is possible for malicious files disguised as these safe files to automatically
download, open, and infect Mac
To switch off the Open “safe” files after downloading:
• Open the Safari browser
• Click on Safari – Preferences – General
• Click to remove the checkmark next to Open “safe” files after downloading
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
p g
iPhone Safari Browser Memory
Exhaustion Remote Dos VulnerabilityExhaustion Remote Dos Vulnerability
h l b l fThis vulnerability target v1.1.2 firmware
handsets
Once a malicious website is accessed, it will
generate a memory hog in iPhone’s Safari
browser and freezes the iPhonebrowser and freezes the iPhone
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Securing Safarig
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Getting started
In order to change settings, select Safari and then select Preferences
Pop up windows also can be blocked using the setting “Block Pop-up
Windows”
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Preferences
General tab under Preferences has many options Save downloaded files to:
and Open “safe” files after downloading, but it is not recommended to selectand Open safe files after downloading, but it is not recommended to select
this option
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
AutoFill
AutoFill is an another option under Preferences menu
What types of forms browser needs to fill in automatically should be selected in this
option
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security Features
d i b b d kiUnder security tab web content and cookie
options can be changed
Th W b C t t ti it tThe Web Content section permits to
enable or disable various forms of
scripting and active content
Cookies should be accepted from few sites
only
It is recommended to select the option
“Ask before a non-secure form to a secure
website”
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hacking Netscape
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Netscape Navigator Improperly
Validates SSL SessionsValidates SSL Sessions
This vulnerability includes information CERT/CC would not ordinarily
publish including specific site names and exploit informationpublish, including specific site names and exploit information
The flaw effectively disables one of the two basic SSL functionalitiesThe flaw effectively disables one of the two basic SSL functionalities
Using this flaw the attacker can make users send secret information (likeUsing this flaw, the attacker can make users send secret information (like
credit card data and passwords) to his web server rather than the real one
Solution:
• Netscape has provided a Navigator Add-on called Personal Security Manager
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Netscape has provided a Navigator Add-on called Personal Security Manager.
Installation of PSM corrects this flaw
Netscape Navigator Security
VulnerabilityVulnerability
This vulnerability may allow a Web site operator to retrieve known files fromThis vulnerability may allow a Web site operator to retrieve known files from
the hard disks of visiting users by mimicking the submission of a form
To access a file on the hard drive the Web site operator would need to know
the exact name and location of the file
Solution:
• Security Advisor is opened by selecting the lock in the toolbar. “Sending
U d I f i Si " i l d d N i bl h
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Unencrypted Information to a Site" is selected under Navigator to enable that
warning dialog box
Securing Netscapeg p
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Getting Started
To edit the security settings for Netscape, select Tools, then Optionsy g p p
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Privacy Settings
Under privacy section there is an
option for setting cookies
Cookies can be accepted for few sites
and rest will be left by mentioning
sites address in Exceptionssites address in Exceptions
Cookies can be kept un till they expire
or browser is running
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security Settings
Under security settings passwords
settings can be changed
Passwords can be remembered by
browser with some exceptionsp
Master password is also set toMaster password is also set to
browser in order to manage
passwords
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Content Settings
Pop ups, images and java script
can be enabled and disabled
d b i iunder content tab in options
Pop ups and images can be
enabled for few sites with
exceptionsexceptions
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Clear Private Data
Clear private data option is
selected under tools tab in menu
bar
It will clear all the private data
including browsing history,
cookies, cache, passwords and all
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pogo Browser
Pogo, a new 3D web browser, allows users toPogo, a new 3D web browser, allows users to
visually manage their online experience, offering
a better UI while leveraging the Mozilla codebase
for safe, secure and standardized browsing
Pogo works like a regular browser, but it
i llmanages pages more visually
Instead of tabs, it has a scrollable strip on the
bottom that shows a thumbnail image of each
site you have visited during your session
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pogo Browser: Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pogo Browser: Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
The browser requests the specific document (including its pathThe browser requests the specific document (including its path
statement) from the server computer
Firefox contains a password management vulnerability that can allow
malicious Web sites to steal user passwordsmalicious Web sites to steal user passwords
Firefox does not support VBScript and ActiveX Controls, which are often
the source of attacks and vulnerabilities within IE
Opera supports Secure Socket Layer (SSL) versions 2 and 3, and TLS and
offers automatic 256-bit encryption
h S f i b i ll “ f ” fil h iThe Safari browser automatically opens “safe” files such as movies,
pictures, sounds, PDFs, text files, disk images and other archived files
Netscape vulnerability includes information CERT/CC would not
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
p y /
ordinarily publish, including specific site names and exploit information
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Weitere ähnliche Inhalte

Was ist angesagt?

Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesVi Tính Hoàng Nam
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesVi Tính Hoàng Nam
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesKislaychd
 
Cyber attacks 101
Cyber attacks 101Cyber attacks 101
Cyber attacks 101Rafel Ivgi
 
Ceh v5 module 17 physical security
Ceh v5 module 17 physical securityCeh v5 module 17 physical security
Ceh v5 module 17 physical securityVi Tính Hoàng Nam
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesVi Tính Hoàng Nam
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEric Vanderburg
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...Eric Vanderburg
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hackingth3prodevelopper
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)Sri Prasanna
 

Was ist angesagt? (20)

Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devices
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
File000131
File000131File000131
File000131
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
File000174
File000174File000174
File000174
 
Cyber attacks 101
Cyber attacks 101Cyber attacks 101
Cyber attacks 101
 
File000132
File000132File000132
File000132
 
Ceh v5 module 17 physical security
Ceh v5 module 17 physical securityCeh v5 module 17 physical security
Ceh v5 module 17 physical security
 
Ce hv6 module 62 case studies
Ce hv6 module 62 case studiesCe hv6 module 62 case studies
Ce hv6 module 62 case studies
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
 
File000127
File000127File000127
File000127
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hacking
 
File000128
File000128File000128
File000128
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)
 
File000125
File000125File000125
File000125
 

Andere mochten auch

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorismVi Tính Hoàng Nam
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversVi Tính Hoàng Nam
 
Ce hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesCe hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesVi Tính Hoàng Nam
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesVi Tính Hoàng Nam
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsVi Tính Hoàng Nam
 
Ce hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data lossCe hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data lossVi Tính Hoàng Nam
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsVi Tính Hoàng Nam
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Ce hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemCe hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemVi Tính Hoàng Nam
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresVi Tính Hoàng Nam
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageVi Tính Hoàng Nam
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesVi Tính Hoàng Nam
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch managementVi Tính Hoàng Nam
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingVi Tính Hoàng Nam
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesVi Tính Hoàng Nam
 

Andere mochten auch (20)

Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Ceh v5 module 21 cryptography
Ceh v5 module 21 cryptographyCeh v5 module 21 cryptography
Ceh v5 module 21 cryptography
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database servers
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Ce hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesCe hv6 module 47 spying technologies
Ce hv6 module 47 spying technologies
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniques
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 
Ce hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data lossCe hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data loss
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Ce hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemCe hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning system
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasures
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionage
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online games
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch management
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 

Ähnlich wie Ce hv6 module 53 hacking web browsers

Http only cookie
Http only cookieHttp only cookie
Http only cookiefool2fish
 
Web Browser
Web BrowserWeb Browser
Web Browsermandeag
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsgaurang17
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)Wail Hassan
 
Web browser and Security Threats
Web browser and Security ThreatsWeb browser and Security Threats
Web browser and Security ThreatsHTS Hosting
 
Web browsers
Web browsersWeb browsers
Web browserslearnt
 
More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8msz
 
Cookiejacking2011 final
Cookiejacking2011 finalCookiejacking2011 final
Cookiejacking2011 finalsebjoh
 
New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)msz
 
Cool Tools for Library Webmasters - Internet Librarian 2008
Cool Tools for Library Webmasters - Internet Librarian 2008Cool Tools for Library Webmasters - Internet Librarian 2008
Cool Tools for Library Webmasters - Internet Librarian 2008Darlene Fichter
 
Abusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAbusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAjin Abraham
 
New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)msz
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliVannaSchrader3
 
Widgets Tools and Doodads for Webmasters - CIL 2008
Widgets Tools and Doodads for Webmasters - CIL 2008Widgets Tools and Doodads for Webmasters - CIL 2008
Widgets Tools and Doodads for Webmasters - CIL 2008Darlene Fichter
 
More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17msz
 

Ähnlich wie Ce hv6 module 53 hacking web browsers (20)

Http only cookie
Http only cookieHttp only cookie
Http only cookie
 
Web Browser
Web BrowserWeb Browser
Web Browser
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
Web browser and Security Threats
Web browser and Security ThreatsWeb browser and Security Threats
Web browser and Security Threats
 
Web browsers
Web browsersWeb browsers
Web browsers
 
More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8
 
Cookiejacking2011 final
Cookiejacking2011 finalCookiejacking2011 final
Cookiejacking2011 final
 
Browsers
BrowsersBrowsers
Browsers
 
New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)
 
Cool Tools for Library Webmasters - Internet Librarian 2008
Cool Tools for Library Webmasters - Internet Librarian 2008Cool Tools for Library Webmasters - Internet Librarian 2008
Cool Tools for Library Webmasters - Internet Librarian 2008
 
Abusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAbusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox Addons
 
New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
Flash Player security
Flash Player securityFlash Player security
Flash Player security
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1Outli
 
Widgets Tools and Doodads for Webmasters - CIL 2008
Widgets Tools and Doodads for Webmasters - CIL 2008Widgets Tools and Doodads for Webmasters - CIL 2008
Widgets Tools and Doodads for Webmasters - CIL 2008
 
More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17
 
Browsers
BrowsersBrowsers
Browsers
 
File000175
File000175File000175
File000175
 

Mehr von Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

Mehr von Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 
I phone v1.2_e
I phone v1.2_eI phone v1.2_e
I phone v1.2_e
 

Kürzlich hochgeladen

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Kürzlich hochgeladen (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Ce hv6 module 53 hacking web browsers

  • 1. Ethical Hacking and CountermeasuresCountermeasures Version 6 Module LIIIModule LIII Hacking Web Browsers
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://infotech.indiatimes.com/
  • 3. Module Objective • Introduction to Web Browsers This module will familiarize you with: • Hacking Firefox • Firefox Security • Hacking Internet Explorer I t t E l S it• Internet Explorer Security • Hacking Opera • Security Features of Opera • Hacking Safari• Hacking Safari • Hacking Netscape • Security And Privacy Features EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow Introduction to Web Browsers Hacking Opera Web Browsers Hacking Firefox Security Features of Opera Hacking SafariFirefox Security Hacking Netscape Hacking SafariFirefox Security Hacking NetscapeHacking Internet Explorer S it A d P i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Internet Explorer Security Security And Privacy Features
  • 5. Introduction M t f th l id W b b th it lMost of the people consider Web browser as the vital key for interacting with the Internet, which connects them to global web sites and helps them to consume online services and provides everything from booking flights to banking services to online shopping This reality makes browsers a key tool when evaluating the security experience of users as theg y p browser interprets Web content and programs delivered from around the world EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. How Web Browsers Work The browser requesting a page The server sending back the requested page System running web browser such as Mozilla, IE. Server machine EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. How Web Browsers Access HTML DocumentsHTML Documents When an URL is entered in the URL field of browser the browser goes through the following three basic steps: • The browser determines what protocol to use • It looks up and contacts the server at the address specified • The browser requests the specific document (including its path ) f hstatement) from the server computer EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. Protocols for an URL The following table shows some of the other protocols that can be part of an URLpart of an URL Protocol Accesses h // dhttp:// HTML documents https:// Some "secure" HTML documents file:// HTML documents on your hard drive ftp:// FTP sites and files gopher:// Gopher menus and documents news:// UseNet newsgroups on a particular newsnews:// UseNet newsgroups on a particular news server news: UseNet newsgroups mailto: E-mail messages EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g telnet: Remote Telnet (login) session
  • 9. H ki Fi fHacking Firefox EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. Firefox Proof of Concept Information Leak VulnerabilityInformation Leak Vulnerability Firefox leaks information that can allow an attacker to load anyy JavaScript file on a machine Technically it is a chrome protocol directory transversalTechnically, it is a chrome protocol directory transversal When a chrome package is “flat” rather than contained in a .jar, the di ecto t a e sal allo s the e tensions di ecto to escape anddirectory traversal allows the extensions directory to escape and files to be read in a predictable location on the disk A visited attacking page is able to load images, scripts, orA visited attacking page is able to load images, scripts, or stylesheets from known locations on the disk Attackers may use this method to detect the presence of files which i k i f i b hi h li i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited may give an attacker information about which applications are installed
  • 11. Firefox Spoofing Vulnerability A flaw has been discovered in Firefox which could be used to trick a user into b li i th t th t ll i iti t t d b itbelieving that they are actually visiting a trusted web site Mozilla’s latest version fails to sanitize single quotation marks and spaces in theg q p "Realm" value of an authentication header This makes it possible for an attacker to create a specially crafted Realm valueThis makes it possible for an attacker to create a specially crafted Realm value which will look as if the authentication dialog came from a trusted site E l i i hi l bili k i h b bl l iExploiting this vulnerability, an attacker might be able to lure a user into providing his/her username, password, or other sensitive information EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 12. Password Vulnerability Fi f i dFirefox contains a password management vulnerability that can allow malicious Web sites to steal user passwords If you have JavaScript enabled and allow Firefox to remember yourallow Firefox to remember your passwords, you are at risk from this flaw EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Concerns With Saving Form Or Login DataLogin Data Firefox has the ability to store commonly used form elements and login credentialscredentials To access the settings for form or login data, open the Options window, and access the Privacy settings (Tools ->Options) To prevent Firefox from saving any sort of form data in the future, uncheck “Save information I enter in web page forms and the Search Bar” To prevent Firefox from saving any login credentials, uncheck “Remember Passwords” Password Manager allows for fine-grained management of passwords Password Manager allows to view any passwords that are previously saved by EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Password Manager allows to view any passwords that are previously saved by Firefox
  • 14. Cleaning Up Browsing History Firefox stores records the browsingg history in three ways: HiHistory: A list of visited sites Download History: A list of files downloaded Cache: A temporary storage area for web page files EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited page files
  • 15. Cookies Cookies are little pieces of information that are left on computer by web sites Cookies have legitimate uses Message boards use them so that a forum member does not have to log in every single time he/she visits Merchant sites use cookies to keep track of what is being added to shopping carts Cookies can also store a database session or some other piece of information that allows the web site to know what has transpired previously “For the originating web site only” feature should probably be turned on this will block web EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited For the originating web site only feature should probably be turned on, this will block web bugs from setting cookies and will allay many privacy concerns
  • 16. Internet History Viewer: Cookie ViewerCookie Viewer Cookie Viewer discovers the information that web sites store on usersCookie Viewer discovers the information that web sites store on users computer It automatically scans your computer, looking for "cookies" created by Microsoft's Internet Explorer, Netscape's Navigator, and Mozilla Project's FireFox web browsers It can also delete any unwanted cookies stored by these browsers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Cookie Viewer: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Firefox SecurityFirefox Security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. Blocking Cookies Options Firefox can flush cookies every time the browser closes down or users can set the datebrowser closes down, or users can set the date on which they want the cookies to expire Lik J S i t ki b di bl dLike JavaScript, cookies can be disabled entirely but many sites require cookies to function properly It is easy enough to set few sites as exceptions This involves low-maintenance and is less intrusive than addressing each individual EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited intrusive than addressing each individual cookie specifically
  • 20. Tools For Cleaning Unwanted CookiesCookies There is a built-in tool for cookie removal in FirefoxThere is a built in tool for cookie removal in Firefox There is a problem to clear out some cookies and save some othersThere is a problem to clear out some cookies and save some others The sites for which the cookies are to be saved must be highlightedThe sites for which the cookies are to be saved must be highlighted “Don’t allow sites that set removed cookies to set future cookies” must be selected before clearing cookies CookieCuller is a modified version of the Cookie Manager built into the Firefox EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited CookieCuller is a modified version of the Cookie Manager built into the Firefox browser
  • 21. Tool: CookieCuller CookieCuller protects the wanted cookies and quickly delete the unwantedand quickly delete the unwanted Gives quick access to the CookieCuller dialog using a custom toolbar buttondialog using a custom toolbar button Optionally deletes unprotected cookies on bbrowser startup Right Click on any toolbar icon and selectg y Customize Drag the CookieCuller icon to a position on EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Drag the CookieCuller icon to a position on the toolbar where it needs to be placed
  • 22. CookieCuller: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Getting Started To edit the settings for Mozilla Firefox, select Tools, then Optionsg p EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. Privacy Settings Under privacy section there is an option for setting cookies Cookies can be accepted for few sites and rest will be left by mentioning sites address in Exceptionssites address in Exceptions Cookies can be kept un till they expire or browser is running EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. Security Settings Under security settings passwords settings can be changed Passwords can be remembered by browser with some exceptionsp Master password is also set toMaster password is also set to browser in order to manage passwords EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Content Settings Pop ups, images and java script can be enabled and disabled d b i iunder content tab in options Pop ups and images can be enabled for few sites with exceptionsexceptions EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. Clear Private Data Clear private data option is selected under tools tab in menu barbar It will clear all the private data including browsing history, cookies cache passwords and allcookies, cache, passwords and all EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. Mozilla Firefox Security Features Firefox includes built-in controls to block pop-upsFirefox includes built in controls to block pop ups Firefox does not support VBScript and ActiveX Controls, which are often the source of attacks and vulnerabilities within IE Way of handling secure Web sites, such as e-commerce or online banking sites When visiting a secure site Firefox highlights the address bar's URL in yellow and shows the Lock• When visiting a secure site, Firefox highlights the address bar s URL in yellow and shows the Lock icon • If you click the Lock icon, you can review the site's security information and decide whether to continue • The domain name of the site you are visiting is also listed in the right-hand corner of securey g g windows, so you know the true source of every page • A criminal hacker might be able to spoof the location bar address, but he/she will not be able to spoof this secondary address display EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Adblock extension blocks flash advertising from Web sites
  • 29. Hacking Internet ExplorerHacking Internet Explorer EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Redirection Information Disclosure VulnerabilityDisclosure Vulnerability The vulnerability is caused due to an error in the handling of di i f i h h " h l " h dlredirections for URLs with the "mhtml:" URI handler This can be exploited to access documents served from another webp site Attacker can disclose potentially sensitive information using thisp y g vulnerability S l iSolution: • Apply patches EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Window Injection Vulnerability This vulnerability can be exploited by an attacker to spoof the content of websites The problem is that a website can inject content into another site's window if the t t f th i d i ktarget name of the window is known Solution:Solution: • Do not browse untrusted sites while browsing trusted sites EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited trusted sites
  • 32. Internet Explorer SecurityInternet Explorer Security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Getting Started To get started, Tools > Internet Options EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Security Zones Click on the Security tab that shows the various IE security zonesvarious IE security zones Internet zone is where all sites initially start outstart out High security setting should be applied for Internet zoneInternet zone By selecting the High security setting, several features including ActiveX Activeseveral features including ActiveX, Active scripting, and Java will be disabled With these features disabled, the browser EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited will be more secure
  • 35. Custom Level Clicking on the Custom Level buttonClicking on the Custom Level button displays more granular control over what features are allowed in the zone Default values for the High security setting can be selected by choosing High and clicking the Reset button to apply the changesthe changes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. Trusted Sites Zone Trusted sites are a security zone forTrusted sites are a security zone for web sites which are securely designed and contain trustworthy content They can be added by clicking sites b ttbutton It i d d t t thIt is recommended to set the security level for the Trusted sites zone to Medium when Internet zone is set to high EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g
  • 37. Privacy In the Privacy tab, settings for configuring cookies are made It is recommended to select the Advanced button and select Override automatic cookie handlingOverride automatic cookie handling EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. Overwrite Automatic Cookie HandlingHandling Select Prompt for both first and third-party cookies; this will prompt each time a site tries to place a cookie on computerprompt each time a site tries to place a cookie on computer EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Per Site Privacy Actions Cookie settings for specific sites b d b l hcan be managed by selecting the "Sites" button Sites can be added and removed Bottom section of this window will specify the domain of the site It specifies action to be taken when that site wants to place a ki h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited cookie on that computer
  • 40. Specify Default Applications Under the Programs tab, speciation can be made for default applications for viewingdefault applications for viewing Web sites, e-mails, and other network related tasks Internet Explorer can prevent showing the message asking to be the default Web browserbe the default Web browser EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Internet Explorer Security FeaturesFeatures 1 • Default protection from potentially dangerous Active X controls 2 • Per-zone control of Active X opt-in 3 • Site and zone locking for Active X controls 4 • Protection against phishing 5 • Cross-domain security 6 • Locked down security zones 7 • Better SSL/TLS notification and digital certificate info 8 • Privacy protection features 9 • Has Address bars EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 10 • International character alert
  • 42. Hacking OperaHacking Opera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. JavaScript Invalid Pointer VulnerabilityVulnerability A vulnerability has been reported in Opera, which potentially can be exploited by malicious people to compromise a users system It is caused due to an unspecified error when processing JavaScript code and can result in a virtual function call usingJavaScript code and can result in a virtual function call using an invalid pointer This can be exploited to execute arbitrary code by tricking the user into visiting a malicious website EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. BitTorrent Header Parsing VulnerabilityVulnerability The vulnerability is caused due to Opera using already freed memory whenThe vulnerability is caused due to Opera using already freed memory when parsing BitTorrent headers and can lead to an invalid object pointer being dereferenced This can be exploited to execute arbitrary code, when the user is tricked into clicking on a specially crafted BitTorrent file and then removes it via a right- click from the download panep EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. Torrent File Handling Buffer Overflow VulnerabilityOverflow Vulnerability The vulnerability is caused due to a boundary error in the handling of certain keys in torrent files It can be exploited to cause a stack-based buffer overflow when a user right-clicks a malicious torrent entry in thee a use g t c c s a a c ous to e t e t y t e transfer manager Successful exploitation allows execution of arbitrary code EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Security Features of Operay p EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. Security and Privacy Features EncryptionEncryption • Opera supports Secure Socket Layer (SSL) versions 2 and 3, and TLS and offers automatic 256-bit encryption5 b yp Cookie control • Opera gives detailed control of what cookies to accept and reject, such as allowing for different set-ups for different servers Fraud protection O d d f d t ti t t i t b it th t t EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Operas advanced fraud protection protects user against web sites that try to steal personal information
  • 48. Security and Privacy Features (cont’d)(cont d) Delete private data • Opera can be configured to clear the history and cache when exiting, to protect your privacy. Any kind of private data can easily be erased Security bar • Opera displays security information inside the address bar. By clicking on the yellow security bar user can get access to i f ti b t th lidit f th tifi t EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited more information about the validity of the certificate
  • 49. H ki S f iHacking Safari EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. Safari Browser Vulnerability The Safari browser automatically opens “safe” files such as movies, pictures,y p , p , sounds, PDFs, text files, disk images and other archived files It is possible for malicious files disguised as these safe files to automatically download, open, and infect Mac To switch off the Open “safe” files after downloading: • Open the Safari browser • Click on Safari – Preferences – General • Click to remove the checkmark next to Open “safe” files after downloading EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p g
  • 51. iPhone Safari Browser Memory Exhaustion Remote Dos VulnerabilityExhaustion Remote Dos Vulnerability h l b l fThis vulnerability target v1.1.2 firmware handsets Once a malicious website is accessed, it will generate a memory hog in iPhone’s Safari browser and freezes the iPhonebrowser and freezes the iPhone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. Securing Safarig EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Getting started In order to change settings, select Safari and then select Preferences Pop up windows also can be blocked using the setting “Block Pop-up Windows” EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 54. Preferences General tab under Preferences has many options Save downloaded files to: and Open “safe” files after downloading, but it is not recommended to selectand Open safe files after downloading, but it is not recommended to select this option EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 55. AutoFill AutoFill is an another option under Preferences menu What types of forms browser needs to fill in automatically should be selected in this option EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. Security Features d i b b d kiUnder security tab web content and cookie options can be changed Th W b C t t ti it tThe Web Content section permits to enable or disable various forms of scripting and active content Cookies should be accepted from few sites only It is recommended to select the option “Ask before a non-secure form to a secure website” EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 57. Hacking Netscape EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 58. Netscape Navigator Improperly Validates SSL SessionsValidates SSL Sessions This vulnerability includes information CERT/CC would not ordinarily publish including specific site names and exploit informationpublish, including specific site names and exploit information The flaw effectively disables one of the two basic SSL functionalitiesThe flaw effectively disables one of the two basic SSL functionalities Using this flaw the attacker can make users send secret information (likeUsing this flaw, the attacker can make users send secret information (like credit card data and passwords) to his web server rather than the real one Solution: • Netscape has provided a Navigator Add-on called Personal Security Manager EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Netscape has provided a Navigator Add-on called Personal Security Manager. Installation of PSM corrects this flaw
  • 59. Netscape Navigator Security VulnerabilityVulnerability This vulnerability may allow a Web site operator to retrieve known files fromThis vulnerability may allow a Web site operator to retrieve known files from the hard disks of visiting users by mimicking the submission of a form To access a file on the hard drive the Web site operator would need to know the exact name and location of the file Solution: • Security Advisor is opened by selecting the lock in the toolbar. “Sending U d I f i Si " i l d d N i bl h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Unencrypted Information to a Site" is selected under Navigator to enable that warning dialog box
  • 60. Securing Netscapeg p EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 61. Getting Started To edit the security settings for Netscape, select Tools, then Optionsy g p p EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 62. Privacy Settings Under privacy section there is an option for setting cookies Cookies can be accepted for few sites and rest will be left by mentioning sites address in Exceptionssites address in Exceptions Cookies can be kept un till they expire or browser is running EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 63. Security Settings Under security settings passwords settings can be changed Passwords can be remembered by browser with some exceptionsp Master password is also set toMaster password is also set to browser in order to manage passwords EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 64. Content Settings Pop ups, images and java script can be enabled and disabled d b i iunder content tab in options Pop ups and images can be enabled for few sites with exceptionsexceptions EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 65. Clear Private Data Clear private data option is selected under tools tab in menu bar It will clear all the private data including browsing history, cookies, cache, passwords and all EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 66. Pogo Browser Pogo, a new 3D web browser, allows users toPogo, a new 3D web browser, allows users to visually manage their online experience, offering a better UI while leveraging the Mozilla codebase for safe, secure and standardized browsing Pogo works like a regular browser, but it i llmanages pages more visually Instead of tabs, it has a scrollable strip on the bottom that shows a thumbnail image of each site you have visited during your session EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 67. Pogo Browser: Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 68. Pogo Browser: Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 69. Summary The browser requests the specific document (including its pathThe browser requests the specific document (including its path statement) from the server computer Firefox contains a password management vulnerability that can allow malicious Web sites to steal user passwordsmalicious Web sites to steal user passwords Firefox does not support VBScript and ActiveX Controls, which are often the source of attacks and vulnerabilities within IE Opera supports Secure Socket Layer (SSL) versions 2 and 3, and TLS and offers automatic 256-bit encryption h S f i b i ll “ f ” fil h iThe Safari browser automatically opens “safe” files such as movies, pictures, sounds, PDFs, text files, disk images and other archived files Netscape vulnerability includes information CERT/CC would not EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p y / ordinarily publish, including specific site names and exploit information
  • 70. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 71. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited