CVE Adobe Flash Player Integer Overflow Vulnerability Analysis
|
|
|
- Russell Chase
- 9 years ago
- Views:
Transcription
1 Your texte here. CVE Adobe Flash Player Integer Overflow Vulnerability Analysis October 11 th, 2012 Brian MARIANI & Frédéric BOURLA
2 A FEW WORDS ABOUT FLASH PLAYER Your Adobe texte Flash here is. a multimedia platform used to add animation, video, and interactivity to web pages. Flash manipulates vectors and graphics to provide animation of text, drawings and images. It supports bidirectional streaming of audio and video. It can capture user inputs via mouse, keyboard, microphone and camera. Flash contains an object-oriented language called ActionScript. It supports automation via the JavaScript Flash language.
3 ADOBE FLASH PLAYER HISTORY Flash originated with the application SmartSketch, developed by Jonathan Your Gay. texte here. It was published by FutureWave Software, which was founded by Charlie Jackson, Jonathan Gay and Michelle Welsh. As the Internet became more popular, FutureWave added cell animation editing to the vector drawing capabilities of SmartSketch and released FutureSplash Animator on multiple platforms. FutureWave approached Adobe Systems with an offer to sell them FutureSplash in 1995, but Adobe turned them down at that time. In 1996, FutureSplash was acquired by Macromedia and released as Flash, contracting "Future" and "Splash". Flash is currently developed and distributed by Adobe Systems, as the result of their purchase of Macromedia in 2005.
4 FLASH IS NOT AN EXCEPTION Your Just texte as other here widespread. software Adobe Flash Player has been heavily audited by cybercriminals the last years. Their main objective is to find high-risk security vulnerabilities which does almost not need user's interactivity in order to fully compromise a remote system. Since 2006 Adobe Flash security problems have raised considerably. Tens of vulnerabilities have been reported the last year. The following slides confirms this issue by giving an overview of Adobe Flash Player vulnerabilities reported between 2006 and 2011.
5 SOME STATISTICS Your texte here. Reported vulnerabilities in Adobe Flash Player
6 SOME BAD NEWS ABOUT FLASH PLAYER Your texte here. c
7 TIMELINE OF THE CVE In this document we will be focused in a pretty recent Adobe Flash Player Your vulnerability texte here tagged. as CVE by Mitre. Before the 14 th August 2012 the flaw was seriously abused over Internet and mainly distributed through malicious Microsoft Word documents. [2] [4] On 14 th August 2012 Adobe has finally released a patch. [2] On August 15 th 2012 Alien Vault Labs [4] has published a brief analysis based on a malicious Microsoft Office Word documents with an embedded SWF file. The 17 th August 2012 Mila Parkour from Contagiodump [3] has posted some of these samples. Finally, the 17 th August 2012 Rapid7 has published a working exploit for IE 6/7 and 8 on Windows XP SP3 and finally updated the exploit for IE 9 on Windows 7 SP1.
8 SAMPLES FROM CONTAGIODUMP (1) Mila Parkour provided us with some of the aforementioned samples in order to Your texte here. dig about this vulnerability. These ones are Microsoft Word documents with an embedded SWF document. After a trivial analysis one can easily understand that these files contain suspicious data. There is enough doubtful information to realize that they were intended to launch a client side exploit in Adobe Flash Player. The following slides show some key information found in the sample 7E AED43FD6C5CAB8E06DC0300-iPhone 5 Battery.doc.
9 SAMPLES FROM CONTAGIODUMP (2) The Shockwave Flash object is easily identifiable. Your texte here.
10 SAMPLES FROM CONTAGIODUMP (3) The ActionScript heapspray code and the payload can definitely be recognized. Your texte here.
11 SAMPLES FROM CONTAGIODUMP (4) Your Eventually texte here a strange. font description named Pspop can be found embedded into the SWF document.
12 VULNERABILITY DETAILS Your The texte flaw relies here on. the ActiveX component of Adobe Flash Player before version The code responsible for parsing the OTF file format (OpenType Format) triggers an exception when the file has a large ntables value contained in the kerning. After the code parses the OTF file, an integer overflow occurs and corrupts the memory. In this document we analyze the process which includes the ActionScript heap spray process finishing by triggering the vulnerability which permits code execution. Our lab environment is an English Windows XP SP3 operating system with Internet Explorer version 7 with Flash 11_3_300_268 installed.
13 INTEGER OVERFLOWS Your An integer texte here overflow. vulnerability differs a lot from other kinds of security issues such as buffer or heap overflows. One cannot hijack instantly the execution flow or directly write at arbitrary memory locations. Not all integer overflows are actually exploitable. Many can lead to a denial of service but not always to arbitrary code execution. What is true is that very often one could force a program to read or grab an erroneous value and this can contribute to create serious problems into the program s logic. Owing to all these explanations, integer overflows vulnerabilities are relatively difficult to spot and to exploit. [12]
14 HEAP SPRAYING WITH ACTIONSCRIPT ActionScript is a programming language used in Adobe Air and Flash. Your texte here. Heap spraying is an exploitation technique which consist in placing a specific sequence of bytes at a predictable memory location of the targeted process by allocating chunks of memory. It also provides a way to allocate chunks in the heap area. In the CVE vulnerability a security researcher named Roee Hay used an ActionScript heap spraying in his exploit. The Actionscript code was originally published over Internet. [15] If you are willing to know more about heap spraying, please read this this document.
15 THE ACTIONSCRIPT HEAPSPRAY CODE Your texte here.
16 THE CODE DETAILS The most important lines are 3, 4 and from 17 up to 29. Your texte here. At line 3 the class array is used to create an object named Memory. At line 4 the size of the memory chunk is defined to 0x bytes. At line 19, the function dospray defines a variable named chunk of the bytearray class. The while loop at line 21 will write the second argument using the ascii character set in the memory chunk. Lastly at line 26 a for loop will fill up the memory object with the desired number of chunks. The next slide show the results of this piece of code.
17 THE RESULTS OF HEAPSPRAYING Welcome to the 0x0c world! Your texte here. Let s analyze the vulnerability now.
18 VULNERABILITY ANALYSIS (1) Your After texte triggering here. a working exploit, the call stack is as described in the image below:
19 VULNERABILITY ANALYSIS (2) Your One texte can observe here. that the return addresses start always from the 0x base memory address. This is clearly because we are dealing with a non-aslr (address space layout randomization) windows module.
20 VULNERABILITY ANALYSIS (3) Your At the texte line here 00 it. is possible to identify the 0x0c0c0c0b address which confirms that the flow of execution has been successfully hijacked.
21 VULNERABILITY ANALYSIS (4) Your Taking texte into here consideration. the last return address in the previous call stack minus ten bytes lets us discover the instruction who gains code execution. An EAX pointer seems to allow the attacker to redirect program flow control.
22 VULNERABILITY ANALYSIS (5) Your In order texte to here trace. the source of the problem we put a breakpoint at the entry point of the function containing the instruction responsible of triggering the exploit. After running the exploit again and breaking at the entry point, the last return address of the call stack tells us about the address 0x104354e4.
23 VULNERABILITY ANALYSIS (6) Your Just texte before here the instruction. at the address 0x104354e4 is a call which seems to jump to the function who gets the data from the malformed OTF file. We will call this function issue_func.
24 VULNERABILITY ANALYSIS (7) Your According texte here to Rapid7. the code responsible for parsing the OTF file format triggers an exception when the file has a large ntables value contained in the kerning. If we refer to the malformed OTF file embedded into the SWF document the ntables value is set to
25 VULNERABILITY ANALYSIS (8) Your After texte Adobe here Flash. loads the malicious SWF document in memory we can find the malformed OTF format and the crafted data some bytes farther in memory.
26 VULNERABILITY ANALYSIS (9) Your When texte Adobe here Flash. parses the OTF file the value is passed during the execution of the issue_function. The instruction at the address 0x104418C0 reads the large ntable value
27 VULNERABILITY ANALYSIS (10) Your Later texte the instruction here. SHL EAX, 4 at the address 0x104418c9 logically shifts the EAX register 4 bits to the left. This operation converts the EAX register value to ZERO, leading to an integer overflow. The erroneous value is then pushed into the stack at the instruction 0x104418cc. In the shifting instruction Adobe Flash does an operation over an invalid value and this is exactly what contributes to create serious problems into the program's logic but more importantly into the memory area. The integer overflow corrupts memory in such a way that it is possible to later gain code execution.
28 VULNERABILITY ANALYSIS (11) Your The texte code continues here. and reaches a call to a function which will parse the crafted data from the malformed OTF file. This function is resolved at the address 0x
29 VULNERABILITY ANALYSIS (12) Your In the texte heart here of. this function, the previously erroneous value pushed into the stack ( ) will be taken at the instruction 0x When the code reaches this function for the third time the ECX register points to the beginning of the Kern Table. At this moment it starts to parse the data with the use of the EAX register as the offset reference.
30 VULNERABILITY ANALYSIS (13) At the fifth entry in the function the EAX register will be equal to 8. Your texte here. After adding the EAX and ECX registers, ECX will point to the crafted data which will later corrupt the memory.
31 VULNERABILITY ANALYSIS (14) Your At the texte end here of the. function EBX and EAX values will be equal to the 1e0cffe8 value. This value will be slightly modified and finally written into the memory pointed by the ESI register by four instructions located in the issue_func function.
32 VULNERABILITY ANALYSIS (15) Your Here s texte the here memory. corruption after the code has processed the previously described instructions many times.
33 VULNERABILITY ANALYSIS (16) Your From texte the issue_func here. function, the code will push the ESI register and calls the function at the address 0x b. This is the function which triggers the payload.
34 VULNERABILITY ANALYSIS (17) At this moment the ESI register points to the corrupted memory. Your texte here. The EAX register gets the value pointed by ESI at the address 0x Eventually after reaching the CALL instruction the arbitrary code execution is reached.
35 MITIGATE THE RISK Updating is the best choice for protecting yourself from this specific threat. [14] Your texte here. When this kind of threats is delivered through Microsoft Office documents some mitigations techniques are available, such as: Using EMET. Setting the protected view as the default mode. Enforcing ActiveX security settings.
36 REFERENCES Your texte here. [1] [2] [3] [4] [5] now-available-for-metasploit [6] [7] [8] [9] [10] [11] now-available-for-metasploit [12] [13] [14] [15]
37 THANK YOU FOR READING! Your texte here. Your questions are always welcome!
The Leader in Cloud Security SECURITY ADVISORY
The Leader in Cloud Security SECURITY ADVISORY Security Advisory - December 14, 2010 Zscaler Provides Protection in the Face of Significant Microsoft Year End Patch Cycle Zscaler, working with Microsoft
Windows XP SP3 Registry Handling Buffer Overflow
Windows XP SP3 Registry Handling Buffer Overflow by Matthew j00ru Jurczyk and Gynvael Coldwind Hispasec 1. Basic Information Name Windows XP SP3 Registry Handling Buffer Overflow Class Design Error Impact
Heap-based Buffer Overflow Vulnerability in Adobe Flash Player
Analysis of Zero-Day Exploit_Issue 03 Heap-based Buffer Overflow Vulnerability in Adobe Flash Player CVE-2014-0556 20 December 2014 Table of Content Overview... 3 1. CVE-2014-0556 Vulnerability... 3 2.
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Discovery Vendor Impact Contact Twitter CVE : Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability : QuickTime player 7.6.5
Bypassing Browser Memory Protections in Windows Vista
Bypassing Browser Memory Protections in Windows Vista Mark Dowd & Alexander Sotirov [email protected] [email protected] Setting back browser security by 10 years Part I: Introduction Thesis Introduction
CORE SECURITY. Exploiting Adobe Flash Player in the era of Control Flow Guard. Francisco Falcon (@fdfalcon) Black Hat Europe 2015 November 12-13, 2015
CORE SECURITY Exploiting Adobe Flash Player in the era of Control Flow Guard Francisco Falcon (@fdfalcon) Black Hat Europe 2015 November 12-13, 2015 About me 2 About me Exploit Writer for Core Security.
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
New Tool for Discovering Flash Player 0-day Attacks in the. Wild from Various Channels
New Tool for Discovering Flash Player 0-day Attacks in the Wild from Various Channels @heisecode 1, Background In 2014, Microsoft introduced isolated heap and memory protector to avoid IE UAF exploits,
Defense in Depth: Protecting Against Zero-Day Attacks
Defense in Depth: Protecting Against Zero-Day Attacks Chris McNab FIRST 16, Budapest 2004 Agenda Exploits through the ages Discussion of stack and heap overflows Common attack behavior Defense in depth
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
ERNW Newsletter 51 / September 2015
ERNW Newsletter 51 / September 2015 Playing With Fire: Attacking the FireEye MPS Date: 9/10/2015 Classification: Author(s): Public Felix Wilhelm TABLE OF CONTENT 1 MALWARE PROTECTION SYSTEM... 4 2 GAINING
風 水. Heap Feng Shui in JavaScript. Alexander Sotirov. [email protected]
風 水 Heap Feng Shui in JavaScript Alexander Sotirov [email protected] Black Hat Europe 2007 Introduction What is Heap Feng Shui? the ancient art of arranging heap blocks in order to redirect the program
Bypassing Memory Protections: The Future of Exploitation
Bypassing Memory Protections: The Future of Exploitation Alexander Sotirov [email protected] About me Exploit development since 1999 Research into reliable exploitation techniques: Heap Feng Shui in JavaScript
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
The Prevalence of Flash Vulnerabilities on the Web
TECHNICAL BRIEF FLASH FLOODING The Prevalence of Flash Vulnerabilities on the Web Adobe Flash Player is a cross-platform, browser plugin that provides uncompromised viewing of expressive applications,
Firefox, Opera, Safari for Windows BMP file handling information leak. September 2008. Discovered by: Mateusz j00ru Jurczyk, Hispasec Labs
Firefox, Opera, Safari for Windows BMP file handling information leak September 2008 Discovered by: Mateusz j00ru Jurczyk, Hispasec Labs 1. Introduction The bitmap format implementations in Mozilla Firefox
Exploiting nginx chunked overflow bug, the undisclosed attack vector
Exploiting nginx chunked overflow bug, the undisclosed attack vector Long Le [email protected] About VNSECURITY.NET CLGT CTF team 2 VNSECURITY.NET In this talk Nginx brief introduction Nginx chunked
Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program.
The Power of Fuzz Testing to Reduce Security Vulnerabilities Transcript Part 1: Why Fuzz Testing? Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT program is part
Application-Specific Attacks: Leveraging the ActionScript Virtual Machine
IBM Global Technology Services April 2008 Application-Specific Attacks: Leveraging the ActionScript Virtual Machine By Mark Dowd X-Force Researcher IBM Internet Security Systems ([email protected])
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
Where s the FEEB? The Effectiveness of Instruction Set Randomization
Where s the FEEB? The Effectiveness of Instruction Set Randomization Ana Nora Sovarel David Evans Nathanael Paul University of Virginia, Department of Computer Science http://www.cs.virginia.edu/feeb Abstract
Off-by-One exploitation tutorial
Off-by-One exploitation tutorial By Saif El-Sherei www.elsherei.com Introduction: I decided to get a bit more into Linux exploitation, so I thought it would be nice if I document this as a good friend
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Enterprise Mobility Report 06/2015. Creation date: 1.7.2015. Vlastimil Turzík
06/2015 Creation date: 1.7.2015 Author: Vlastimil Turzík Content Content... 2 Introduction... 4 ios... 4 Vulnerability... 4 ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords... 4 Versions:
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
CS412/CS413. Introduction to Compilers Tim Teitelbaum. Lecture 20: Stack Frames 7 March 08
CS412/CS413 Introduction to Compilers Tim Teitelbaum Lecture 20: Stack Frames 7 March 08 CS 412/413 Spring 2008 Introduction to Compilers 1 Where We Are Source code if (b == 0) a = b; Low-level IR code
Attacking Obfuscated Code with IDA Pro. Chris Eagle
Attacking Obfuscated Code with IDA Pro Chris Eagle Outline Introduction Operation Demos Summary 2 First Order Of Business MOVE UP AND IN! There is plenty of room up front I can't increase the font size
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Intrusion Defense Firewall
Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly
Stack Overflows. Mitchell Adair
Stack Overflows Mitchell Adair Outline Why? What? There once was a VM Virtual Memory Registers Stack stack1, stack2, stack3 Resources Why? Real problem Real money Real recognition Still prevalent Very
New Tool for Discovering Flash Player 0-day Attacks in the Wild from Various Channels. @heisecode
New Tool for Discovering Flash Player 0-day Attacks in the Wild from Various Channels @heisecode Agenda Who am I Background Sample Channels Tool to identify 0-day About me Core Member of Trend Micro Zero-Day
Using Impatica for Power Point
Using Impatica for Power Point What is Impatica? Impatica is a tool that will help you to compress PowerPoint presentations and convert them into a more efficient format for web delivery. Impatica for
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
USENIX Security Symposium 2014, San Diego, CA, USA Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Lucas Davi Intel Collaborative Research Institute for
Introduction. Figure 1 Schema of DarunGrim2
Reversing Microsoft patches to reveal vulnerable code Harsimran Walia Computer Security Enthusiast 2011 Abstract The paper would try to reveal the vulnerable code for a particular disclosed vulnerability,
Web Design Specialist
UKWDA Training: CIW Web Design Series Web Design Specialist Course Description CIW Web Design Specialist is for those who want to develop the skills to specialise in website design and builds upon existing
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Software Vulnerability Exploitation Trends. Exploring the impact of software mitigations on patterns of vulnerability exploitation
Software Vulnerability Exploitation Trends Exploring the impact of software mitigations on patterns of vulnerability exploitation Software Vulnerability Exploitation Trends This document is for informational
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER Pierre A. von Kaenel Mathematics and Computer Science Department Skidmore College Saratoga Springs, NY 12866 (518) 580-5292 [email protected] ABSTRACT This paper
PROBLEMS (Cap. 4 - Istruzioni macchina)
98 CHAPTER 2 MACHINE INSTRUCTIONS AND PROGRAMS PROBLEMS (Cap. 4 - Istruzioni macchina) 2.1 Represent the decimal values 5, 2, 14, 10, 26, 19, 51, and 43, as signed, 7-bit numbers in the following binary
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Protection 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos, Symantec,
MWR InfoSecurity Advisory. Interwoven Worksite ActiveX Control Remote Code Execution. 10 th March 2008. Contents
Contents MWR InfoSecurity Advisory Interwoven Worksite ActiveX Control Remote Code Execution 10 th March 2008 2008-03-10 Page 1 of 9 Contents Contents 1 Detailed Vulnerability Description...5 1.1 Introduction...5
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
A Link Layer Discovery Protocol Fuzzer
The University of Texas at Austin, Department of Computer Sciences, Technical Report TR-07-24 A Link Layer Discovery Protocol Fuzzer Jeremy Hollander Department of Computer Sciences The University of Texas
The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected]
The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected] What is a sandbox? Environment designed to run untrusted (or exploitable) code, in a manner
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Install this update to increase the performance of web sites that use Ajax. After you install this item, you may have to restart your computer.
Windows XP Pro Service Pack 2 Approved Window Update Windows XP (KB896423) Update Description A security issue has been identified in the Print Spooler service that could allow an attacker to compromise
Absolute Backdoor Revisited. Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs
Absolute Backdoor Revisited Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs BlackHat, Las Vegas August, 2014 What is Computrace? Computrace is an Anti-Theft software
Sandbox Roulette: Are you ready for the gamble?
Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected] What is a sandbox? In computer security terminology, a sandbox is an environment designed
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients
Hp Compaq t5000 Thin Clients June 2004 Instructions. Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients Table Of Contents Table Of Contents... 1 Executive Summary... 2 Virus Vulnerabilities,
Chapter 6: Project Planning & Production
AIM Your Project with Flash: Chapter 6 - Project Planning and Production 105 Chapter 6: Project Planning & Production After completing this module, you ll be able to: plan a Flash project. consider design
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
Microsoft Migrating to PowerPoint 2010 from PowerPoint 2003
In This Guide Microsoft PowerPoint 2010 looks very different, so we created this guide to help you minimize the learning curve. Read on to learn key parts of the new interface, discover free PowerPoint
Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
Exception and Interrupt Handling in ARM
Exception and Interrupt Handling in ARM Architectures and Design Methods for Embedded Systems Summer Semester 2006 Author: Ahmed Fathy Mohammed Abdelrazek Advisor: Dominik Lücke Abstract We discuss exceptions
Image Based Spam: White Paper
The Rise of Image-Based Spam No matter how you slice it - the spam problem is getting worse. In 2004, it was sufficient to use simple scoring mechanisms to determine whether email was spam or not because
White Paper. No Signature Required: The Power of Emulation in Preventing Malware
No Signature Required: The Power of Emulation in Preventing Malware Table of Contents Emerging Threats Require a New Approach to Protection....3 Real-Time Behavior Emulation of Web Content...3 Use Case
Return-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
How To Hack The Steam Voip On Pc Orchesterian Moonstone 2.5 (Windows) On Pc/Robert Kruber (Windows 2) On Linux 2.2.2 (Windows 3.5) On A Pc
ReVuln Ltd. http://revuln.com @revuln [email protected] Revision 3 STEAM VOIP SECURITY BY LUIGI AURIEMMA Overview and details about the security issues found in the Steam voice framework. TABLE OF CONTENTS
============================================================= =============================================================
Stephan Lantos Subject: FW: @RISK: The Consensus Security Vulnerability Alert: Vol. 13, Num. 23 In partnership with SANS and Sourcefire, Qualys is pleased to provide you with the @RISK Newsletter. This
http://www.nologin.org Bypassing Windows Hardware-enforced Data Execution Prevention
http://www.nologin.org Bypassing Windows Hardware-enforced Data Execution Prevention Oct 2, 2005 skape [email protected] Skywing [email protected] One of the big changes that Microsoft introduced
XI'AN NOVASTAR TECH CO., LTD
Notes and FAQ 1 Some conflicts between decoders may cause media play error. Do not install decoders or media players arbitrary. They may conflict with each other and thus cause errors when NovaStudio plus
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION MOST OF THE IMPORTANT DATA LOSS VECTORS DEPEND ON COPYING files in order to compromise
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Shane Hartman CISSP, GCIA, GREM Suncoast Security Society
Shane Hartman CISSP, GCIA, GREM Suncoast Security Society Analyzing Malware Why Flash Malware Structure of an SWF File History of Flash Scripting Exploit Example 1: Social Engineering Exploit Example 2:
CHAPTER 7: The CPU and Memory
CHAPTER 7: The CPU and Memory The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
Develop Computer Animation
Name: Block: A. Introduction 1. Animation simulation of movement created by rapidly displaying images or frames. Relies on persistence of vision the way our eyes retain images for a split second longer
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
WINDOWS UPDATES AND MAJOR BUILDS
WINDOWS UPDATES AND MAJOR BUILDS Updates install automatically, and you can t pick and choose Another big change with Window 10 is that there will be automatic updates, so there s less chance of you missing
Using Windows Movie Maker to Create Movies
Using Windows Movie Maker to Create Movies Windows Movie Maker 2.1 is free! It comes with Windows XP or can be downloaded from the Microsoft Website. http://www.microsoft.com/windowsxp/downloads/updates/moviemaker2.mspx
Basics of Accessible Design
Basics of Accessible Design Font Consider using a sans serif type font such as Arial or Veranda. The sans serif fonts are easier for people with reading disorders and visual impairments to read. This document
Reviewer s Guide. Morpheus Photo Animation Suite. Screenshots. Tutorial. Included in the Reviewer s Guide:
Morpheus Photo Animation Suite Reviewer s Guide The all-in-one animation suite includes Morpheus Photo Morpher, Morpheus Photo Warper, Morpheus Photo Mixer, as well as all 15 sample morphs, warps, and
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Coverity White Paper. Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing
Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing The Stakes Are Rising Security breaches in software and mobile devices are making headline news and costing companies
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
The AVR Microcontroller and C Compiler Co-Design Dr. Gaute Myklebust ATMEL Corporation ATMEL Development Center, Trondheim, Norway
The AVR Microcontroller and C Compiler Co-Design Dr. Gaute Myklebust ATMEL Corporation ATMEL Development Center, Trondheim, Norway Abstract High Level Languages (HLLs) are rapidly becoming the standard
MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May 2010. Contents
Contents MWR InfoSecurity Security Advisory BT Home Hub SSID Script Injection Vulnerability 10 th May 2010 2010-05-10 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
