Главная
Study mode:
on
1
Intro
2
Exploit
3
Tools
4
How Images Work
5
Images in Layers
6
Image Layers
7
Composite Layers
8
JPEG
9
Encoding
10
Decoder Code
11
HTML5 Canvas
12
Decoder
13
Images
14
Polyglots
15
JPEG markers
16
JPEG files
17
Compression
18
HTML Code
19
JavaScript
20
Testing
21
HTML Template
22
Decoder Script
23
New JPEG
24
JPEG Result
25
Preview App
26
JJ Encoding
27
Delivery
28
Close Browser
29
Load Image
30
Open Image
31
Meterpreter
32
Privilege Escalation
33
Authority System
34
Give or Take
35
PNG
36
CC
37
PNG demo
38
Bit layer 0
39
Green Channel
40
Exploit Bit
41
Calculator
42
Browser
43
Demo
44
Demo Success
45
Exploit Delivery
46
Content Sniffing
47
Data Forensics
48
Detection
49
Where to get it raw
50
Conclusions
51
The Challenge
52
Browsers need to wake up
53
Questions Answers
Description:
Explore an innovative technique for delivering browser exploits through image files using steganography and polyglots in this Black Hat conference talk. Delve into the Stegosploit Toolkit v0.3, which encodes drive-by exploits into JPG and PNG images, creating undetectable payloads. Learn about the fusion of HTML and Javascript decoder code with image files to create HTML+Image polyglots that appear as normal images but execute malicious code when loaded in a victim's browser. Discover the intricacies of image encoding, JPEG and PNG file structures, HTML5 Canvas, and various delivery methods. Witness live demonstrations of successful exploit deliveries and discuss the implications for content sniffing, data forensics, and browser security. Gain insights into the challenges this technique poses for current detection methods and the need for improved browser security measures.

Exploit Delivery With Steganography and Polyglots

Black Hat
Add to list
0:00 / 0:00