Script Fragmentation (A New Web Attack Vector) Brucon 2009

Description: <div style="text-align: justify;">This talk titled "<span style="font-weight: bold;">A new web attack vector: Script Fragmentation</span>" was given by Stephan Chenette at Brucon 2009. You can download the presentation slides here. <br><br><span style="font-weight: bold;">Abstract:</span> This presentation will introduce a new web-based attack vector which utilizes client-side scripting to fragment malicious web content. This involves distributing web exploits in a asynchronous manner to evade signature detection. Similar to TCP fragmentation attacks, which are still an issue in current IDS/IPS products, This attack vector involves sending any web exploit in fragments and uses the already existing components within the web browser to reassemble and execute the exploit. Our presentation will discuss this attack vector used to evade both gateway and client side detection. We will show several proof of concepts containing common readily available web exploits. <br><br><span style="font-weight: bold;">Speaker Bio:</span> Stephan Chenette is a Senior Security Researcher for Websense Security Labs working on malcode detection techniques. Mr. Chenette specializes in research tools ranging from kernel-land sandboxes, to static analysis scanners. He has released public analysis on various vulnerabilities and malware. Prior to joining Websense, Stephan was a security software engineer for 4 years working in research and product development at eEye Digital Security. <br><br>You can download a High resolution video here. <br><br><br></div><style type="text/css">body { background: #FFF; } </style>

Tags: basics ,





Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.