Monday, 14 July 2014
Top Ten Web Hacking Techniques of 2014
Every year the security community produces a stunning amount of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile platform equivilents. Beyond individual vulnerabilities with CVE numbers or system compromises, here we are solely focused on new and creative methods of Web-based attack. Now it its seventh year, The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. Past Top Tens and the number of new attack techniques discovered in each year: 2006 (65), 2007 (83), 2008 (70), 2009 (82), 2010 (69), 2011 (51)
The Top Ten
CRIME (1, 2, 3 4) by Juliano Rizzo and Thai Duong
Pwning via SSRF (memcached, php-fastcgi, etc) (2, 3, 4, 5)
Chrome addon hacking (2, 3, 4, 5)
Bruteforce of PHPSESSID
Blended Threats and JavaScript
Cross-Site Port Attacks
Permanent backdooring of HTML5 client-side application
CAPTCHA Re-Riding Attack
XSS: Gaining access to HttpOnly Cookie in 2012
Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select)
Honorable Mention
11. Using WordPress as a intranet and internet port scanner
12. .Net Cross Site Scripting – Request Validation Bypassing (1)
13. Bruteforcing/Abusing search functions with no-rate checks to collect data
14. Browser Event Hijacking (2, 3)
15. Bypassing Flash’s local-with-filesystem Sandbox Process oversight. Due to the original discovery date, January 4th, 2011, the technique should not have been included in this years list. How the winners are selected…
Phase 2: Panel of Security Experts [CLOSED]
Judges: Ryan Barnett, Robert Auger, Robert Hansen (CEO, Falling Rock Networks) Dinis Cruz, Jeff Williams (CEO, Aspect Security), Peleus Uhley, Romain Gaucher (Lead Researcher, Coverity), Giorgio Maone, Chris Wysopal, Troy Hunt, Ivan Ristic (Director of Engineering, Qualys), and Steve Christey (MITRE).
From the result of the open community voting, the final 15 Web Hacking Techniques will be voted upon by panel of security experts. Using the exact same voting process as phase 1, the judges will rank the final twenty based of novelty, impact, and overall pervasiveness. Once tabulation is completed, we’ll have the Top Ten Web Hacking Techniques of 2012!
Phase 1: Open community voting for the final 15 [CLOSED]
Each attack technique (listed alphabetically) receives a certain amount of points depending on how highly the entry is ranked in each ballot. For example, an entry in position #1 will be given 15 points, position #2 will get 14 points, position #3 gets 13 points, and so on down to 1 point. At the end all points from all ballots will be tabulated to ascertain the top fifteen overall.
Final 15 List (In no particular order):
Chrome addon hacking (2, 3, 4, 5)
Browser Event Hijacking (2, 3)
Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select)
Cross-Site Port Attacks
CRIME (2)
Blended Threats and JavaScript
Pwning via SSRF (memcached, php-fastcgi, etc) (2, 3)
Bruteforcing/Abusing search functions with no-rate checks to collect data
Permanent backdooring of HTML5 client-side application
.Net Cross Site Scripting – Request Validation Bypassing (1)
Bruteforce of PHPSESSID
XSS: Gaining access to HttpOnly Cookie in 2012
CAPTCHA Re-Riding Attack
Bypassing Flash’s local-with-filesystem Sandbox
Using WordPress as a intranet and internet port scanner
Prizes
1) The winner of this years top ten will receive an updated Web security book library! If any really good books have been recently published and missing, please let me know. I’ll add it! Violent Python, Clickjacking und UI-Redressing,Web Application Defender’s Cookbook, Seven Deadliest Web Application Attacks, A Bug Hunter’s Diary, The Tangled Web, The Web Application Hacker’s Handbook, Web Application Obfuscation, XSS Attacks, Hacking Web Apps. 2) After the open community voting process, two survey respondents will be chosen at random and given a $50 Amazon gift card.
Complete 2012 List
CSRF token disclosure via iFRAME and CAPTCHA trickery (2)
Parasitic computing using ‘Cloud Browsers’ (2)
Browser Event Hijacking (2, 3)
Cross-Site Port Attacks
How I Hacked StackOverflow
Visitor Tracking Without Cookies (or How To Abuse HTTP 301s)
The “I Know…” series. What websites know about you
Hyperlink Spoofing and the Modern Web
Pwning via SSRF (memcached, php-fastcgi, etc) (2, 3)
Using the HTML5 Fullscreen API for Phishing Attacks
Steam Browser Protocol Insecurity
Content Smuggling
Using HTTP headers pollution for mobile networks attacks (2)
CRIME (2)
Top-Level Universal XSS
Blended Threats and JavaScript
Exploiting XSS in Ajax Web Applications
.Net Cross Site Scripting – Request Validation Bypassing
Stuffing Javascript into DNS names
Clickjacking Rootkits for Android (2)
How Facebook lacked X-Frame-Options and what I did with it
IE9 Self-XSS Blackbox Protection bypass
Bruteforce of PHPSESSID
File System API with HTML5 – Juice for XSS
How to upload arbitrary file contents cross-domain
Bypassing HTTP Basic Authenitcation in PHP Applications (** potential rediscovery of: HTExploit – Bypassing .htaccess restrictions **)
XSS: Gaining access to HttpOnly Cookie in 2012
CSS-Only Clickjacking
X-Frame-Options (XFO) Detection from Javascript
Fun with data: URLs
Browsers Anti-XSS methods in ASP (classic) have been defeated!
Yes, you can have fun with downloads
Stiltwalker, exploits weaknesses in the audio version of reCAPTCHA
CSS :visited may be a bit overrated
“ASPXErrorPath in URL” Technique in Scanning a .Net Web Application
Cursorjacking again
Chrome addon hacking (2, 3, 4, 5)
Jumping out of Touch Screen Kiosks
Using POST method to bypass IE-browser protected XSS
Password extraction from Ajax/DOM/HTML5 routine
Random Number Security in Python
Bypassing Flash’s local-with-filesystem Sandbox
RCE through mangled WAR upload into Tomcat App Manager using PUT-in-Gopher-over-XXE (1)
Using WordPress as a intranet and internet port scanner
UI Redressing Mayhem: Firefox 0-Day And The LeakedIn Affair
UI Redressing Mayhem: HTTPOnly Bypass PayPwn Style
NTLM Relay via HTTP to internet or stealing windows user hashes while using java client
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers (1,2)
CAPTCHA Re-Riding Attack
Attacking CAPTCHAs for Fun and Profit
Permanent backdooring of HTML5 client-side application [Apture example]
Cracking Ruby on Rails Sessions
Bruteforcing/Abusing search functions with no-rate checks to collect data
Cross Context Scripting from within the Browser (1)
Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select)
Same Origin Spoofing to Attack Client Certificate Sessions
This entry was posted in Vulnerabilities, Web Application Security on December 6, 2012 by Jeremiah Grossman.
About Jeremiah Grossman
Jeremiah Grossman is the Founder and interim CEO of WhiteHat Security, where he is responsible for Web security R&D and industry outreach. Over the last decade, Mr. Grossman has written dozens of articles, white papers, and is a published author. His work has been featured in the Wall Street Journal, Forbes, NY Times and hundreds of other media outlets around the world. As a well-known security expert and industry veteran, Mr. Grossman has been a guest speaker on six continents at hundreds of events including TED, BlackHat Briefings, RSA, SANS, and others. He has been invited to guest lecture at top universities such as UC Berkeley, Stanford, Harvard, UoW Madison, and UCLA. Mr. Grossman is also a co-founder of the Web Application Security Consortium (WASC) and previously named one of InfoWorld's Top 25 CTOs. He serves on the advisory board of two hot start-ups, Risk I/O and SD Elements, and is a Brazilian Jiu-Jitsu Black Belt. Before founding WhiteHat, Mr. Grossman was an information security officer at Yahoo!
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment