Главная
Study mode:
on
1
Introduction
2
Defending Against External Entities
3
External Entities
4
ZeroDay
5
Resolvers
6
Nested Exception
7
Cause Exception
8
Exception
9
ASP
10
Disable External Entities
11
Parsers
12
Disable Protocols
13
What are we targeting
14
Browser history
15
Vulnerability trigger
16
quirks mode
17
vulnerable mode
18
how to parse XML
19
how to exploit the vulnerability
20
payload
21
parse
22
bypass similar policies
23
example
24
click on link
25
second demo
26
limitations
27
parse error
28
cookie files
29
enumerate
30
extra treat
31
who is vulnerable
32
update
33
conclusions
34
Thank you
35
Questions
Description:
Explore a Black Hat conference talk delving into critical Xml eXternal Entities (XXE) vulnerabilities in enterprise software. Discover two zero-day exploits affecting Java servers and Internet Explorer, allowing arbitrary file exfiltration and Same Origin Policy bypass. Learn about finding and exploiting these vulnerabilities, as well as prevention strategies. Gain insights into defending against external entities, understanding resolvers, nested exceptions, and disabling protocols. Examine browser history vulnerabilities, quirks mode exploitation, XML parsing techniques, and payload creation. Analyze limitations, parse errors, and cookie file enumeration. Understand who is vulnerable and stay updated on this critical security issue.

FileCry - The New Age of XXE

Black Hat
Add to list