Главная
Study mode:
on
1
Intro
2
Traditional Browser- Based Attacks
3
Traditional Network Exploitation
4
Blended Threats
5
Why Attack Network Devices?
6
SOHO Routers in the Enterprise
7
What Would Be the Worst Case Scenario?
8
Deployment
9
Network Scanning, the
10
Making Network Scanning Better
11
Limitations of JavaScript Based Network Scanning
12
Authentication
13
Basic Auth Brute Force
14
Modifying Firmware
15
Steps to deploy firmware
16
Post-Exploitation
17
Persistence
18
Cons
19
Overview
Description:
Explore advanced browser-based Intranet attacks and blended threats in this Black Hat USA 2012 conference talk. Delve into the evolution of Web browser exploits since 2006, focusing on how HTML5 and modern technologies have overcome previous limitations. Learn about state-of-the-art JavaScript-based attacks that require minimal user interaction and complete the entire exploit attack cycle. Discover techniques for enumeration, discovery, and escalation of attacks into embedded network devices, ultimately leading to mass-scale permanent compromise. Examine the vulnerabilities of home broadband routers and SOHO devices in enterprise environments. Gain insights into network scanning methods, authentication exploits, firmware modification, and post-exploitation strategies for achieving persistence. Understand the potential worst-case scenarios and implications of these advanced attack methodologies for network security.

Blended Threats and JavaScript - A Plan for Permanent Network Compromise

Black Hat
Add to list
0:00 / 0:00