Breaching the Perimeter via Cloud Synchronized Browser Settings

  Рет қаралды 802

Black Hat

Black Hat

3 ай бұрын

Cloud synchronized browser settings provide consistent configurations between devices. A considerable number of these features directly affect the security of the browser. If a cloud-synched browser session is compromised, it is trivial to extract passwords and credit card information, but it can also be leveraged in unexpected ways such as forcing users to browse to malicious URLs. This functionally allows you to bypass the social engineering portion of cracking the perimeter by guaranteeing your malicious links are always clicked. However, that is just the start of the harm that can be done via synchronized browser sessions.
In this presentation, I will demonstrate novel techniques to leverage these settings to wreak havoc against an internal network, including credential theft, compromising of local data, downloading and executing malicious files, and automatically triggering protocol handlers...
By: Edward Prior
Full Abstract and Presentation Materials:
www.blackhat.com/eu-23/briefi...

Пікірлер
Off The Record - Weaponizing DHCP DNS Dynamic Updates
39:50
Black Hat
Рет қаралды 1,7 М.
New Techniques for Split-Second DNS Rebinding
31:20
Black Hat
Рет қаралды 1,4 М.
Stupid Barry Find Mellstroy in Escape From Prison Challenge
00:29
Garri Creative
Рет қаралды 20 МЛН
Which one is the best? #katebrush #shorts
00:12
Kate Brush
Рет қаралды 27 МЛН
Super gymnastics 😍🫣
00:15
Lexa_Merin
Рет қаралды 106 МЛН
My Invisible Adversary: Burnout
40:39
Black Hat
Рет қаралды 2,8 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 588 М.
Something Rotten in the State of Data Centers
40:27
Black Hat
Рет қаралды 8 М.
What Does a Cloud Engineer ACTUALLY Do?
11:05
Tech With Soleyman
Рет қаралды 95 М.
The Black Hat Europe Network Operations Center (NOC) Report
38:03
Intro to AWS - The Most Important Services To Learn
50:07
Be A Better Dev
Рет қаралды 386 М.