Главная
Study mode:
on
1
Intro
2
The WebExtension API
3
Why does this matter?
4
Malicious extensions in the wild
5
More room for abuse
6
Basic Extension Structure
7
Permissions
8
Abuse Hanlon's razor
9
Hiding malicious behavior
10
Example pretext
11
Hiding evall
12
Example code is your friend
13
Extension Command & Control
14
Cloning Extensions
15
Submitting to a Web Store
16
Google Web Store Submissions
17
Google Web Store Analysis
18
Mozilla Add-ons Store
19
Mozilla Add-ons Analysis
20
Chrome Inline Installations
21
Social engineering
22
Installation pretext 1
23
Chrome External Installs
24
Chrome SecurePreferences
25
Post Exploitation Chrome Apps
26
Native Messaging
27
Code Dump
Description:
Explore offensive browser extension development techniques in this 51-minute conference talk from Derbycon 2018. Delve into the WebExtension API, understanding its significance and potential for abuse. Learn about malicious extensions in the wild, basic extension structure, and permissions. Discover methods for hiding malicious behavior, including code obfuscation techniques. Examine extension command and control, cloning extensions, and the process of submitting to web stores. Analyze Google Web Store and Mozilla Add-ons Store submission processes. Investigate Chrome inline installations, social engineering tactics, and installation pretexts. Gain insights into Chrome external installs, secure preferences, and post-exploitation Chrome apps. Explore native messaging capabilities and access a comprehensive code dump for practical implementation.

Offensive Browser Extension Development

Add to list