Breaching the Perimeter via Cloud Synchronized Browser Settings

  Рет қаралды 768

Black Hat

Black Hat

2 ай бұрын

Cloud synchronized browser settings provide consistent configurations between devices. A considerable number of these features directly affect the security of the browser. If a cloud-synched browser session is compromised, it is trivial to extract passwords and credit card information, but it can also be leveraged in unexpected ways such as forcing users to browse to malicious URLs. This functionally allows you to bypass the social engineering portion of cracking the perimeter by guaranteeing your malicious links are always clicked. However, that is just the start of the harm that can be done via synchronized browser sessions.
In this presentation, I will demonstrate novel techniques to leverage these settings to wreak havoc against an internal network, including credential theft, compromising of local data, downloading and executing malicious files, and automatically triggering protocol handlers...
By: Edward Prior
Full Abstract and Presentation Materials:
www.blackhat.com/eu-23/briefi...

Пікірлер
The Worlds Most Powerfull Batteries !
00:48
Woody & Kleiny
Рет қаралды 23 МЛН
Final increíble 😱
00:39
Juan De Dios Pantoja 2
Рет қаралды 14 МЛН
Sigma Girl Education #sigma #viral #comedy
00:16
CRAZY GREAPA
Рет қаралды 90 МЛН
Do you have a friend like this? 🤣#shorts
00:12
dednahype
Рет қаралды 51 МЛН
Solving the secrets of gravity - with Claudia de Rham
1:01:17
The Royal Institution
Рет қаралды 22 М.
How to answer any system design interview question?
1:37:51
Design Gurus
Рет қаралды 2,6 М.
The new MAZ X trailer - amazing!
23:40
808
Рет қаралды 367 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 574 М.
Off The Record - Weaponizing DHCP DNS Dynamic Updates
39:50
Black Hat
Рет қаралды 1,7 М.
New Techniques for Split-Second DNS Rebinding
31:20
Black Hat
Рет қаралды 1,3 М.
The Worlds Most Powerfull Batteries !
00:48
Woody & Kleiny
Рет қаралды 23 МЛН