SlideShare a Scribd company logo
1 of 33
Firefox  (in)Security Prasanna K  Dead Pixel
What  & Who  This presentation demonstrates strength of the Mozilla platform and  how some of the features could be misused by malicious users.  This presentation is intended to dispel a common myth Just using FIREFOX keeps you SECURE
Agenda Basic premise Understanding  the Mozilla Platform Attacking Firefox         Malicious Extensions         XCS Some basic points to watch…. That’s All Folks …
Introduction ,[object Object]
Multi Platform
Modular and Scalable !
Pluggable Extension Code !
Browser of my Choice ,[object Object]
Mozilla Platform  Chrome:  It could be used to indicate a “Special Trusted Zone” within the Mozilla Platform
Mozilla Platform  XUL (pronounced "zool") :  Mozilla's XML-based language that lets you build feature-rich cross platform applications that can run connected or disconnected from the Internet.  <?xml version="1.0"?> <?xml-stylesheethref="chrome://global/skin/" type="text/css"?> <window id="vbox example" title="Example 3...." xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">   <vbox>     <button id="yes" label="Yes"/>     <button id="no" label="No"/>     <button id="maybe" label="Maybe"/>   </vbox> </window>
Mozilla Platform  XBL: XML-based markup language used to declare the behavior and look of XUL-widgets and XML elements. scrollbar { -moz-binding: url('somefile.xml#binding1'); } --  “binding1” is the id of the binding
Mozilla Platform  XPCOM: Cross platform component model from Mozilla. Nerve center of the Mozilla platform. XPCOM  has some Similarity to CORBA and Microsoft COM.
Important Components of Mozilla Platform
Mozilla Platform
Extension Installation – Mozilla Site ,[object Object]
Review process is manual lapses have been found
Over 2 billion add-ons as of today and growing
Add-ons can be distributed through Mozilla without review as wellhttps://addons.mozilla.org/en-US/firefox/addon/2230/
Extension Installation – How else? ,[object Object]
When installing from any site Mozilla pops a warning but the same message appears on the  official site (confusing!).
Extensions can be installed without warning by other software, USB autorun, login scripts etc. ,[object Object]
The filename should be the id of the extension to be loaded
The content of the file should be the location of the extension codeBeware: When this file exists in the folder the extensions is installed automatically it does not require any human interaction.
Extension Security! Mozilla extension security model is completely flat Extension code is treated as fully privilegedby Firefox Vulnerabilities in extension code can result in full system compromise No security boundaries between extensions An extension can silently modify/alter other extensions
The Potential Statistics – Firefox Browser Market Share Beyond 20% globally since November 2008, more than 50% in certain regions/countries Source: Marketshare - marketshare.hitslink.com Over 2 billion add-ons and growing
Extensions are Everywhere
Concerns on AMO Everyone can write extension and submit to AMO (even us  ) AMO review process lacks complete security assessment Few extensions signed in AMO. Extensions are generally not “signed”. Users trust unsigned extensions. Experimental extension (not approved yet) are publicly available
This sums it up
Extension and Malware Some people have already exploited this concept FormSpy - 2006 Downloader-AXM Trojan, poses as the legitimate NumberedLinks 0.9 extension Steal passwords, credit card numbers, and e-banking login details Firestarterfox - 2008 Hijacks all search requests through multiple search engines and redirects them through Russian site thebestwebsearch.net Vietnamese Language Pack - 2008 Shipped with adware Vietnamese Language Pack - 2008 Shipped with adware Might happen in the near future… Malware authors bribe/hack famous/recommended extension developer/vendor Initial benign extension, malware is introduced in a 3rd/4th update
Attacking Firefox ! Now that we have seen the basic architecture & problem, let’s have some fun 
Anatomy of an Extension These are the components of every extension. They are archived together into the XPI file format. Sample Files inside a XPI file exampleExt.xpi:               /install.rdf                   /chrome.manifest /chrome/               /chrome/content/               /browser.xul            /browser.js
Malicious Extensions We will build a malicious extension which will  Log all Key Strokes and send them remotely Execute native code Extract stored passwords  Add a malicious site to the NoScriptwhitelist DEMO
Interesting Finds In the course of making this presentation I found some interesting things

More Related Content

What's hot

Mozila firefox The Internet Browser
Mozila firefox The Internet BrowserMozila firefox The Internet Browser
Mozila firefox The Internet BrowserGurpreet Singh
 
Internet explorer tech support call 1 866-757-9494
Internet explorer tech support call 1 866-757-9494Internet explorer tech support call 1 866-757-9494
Internet explorer tech support call 1 866-757-9494Tech Cillin
 
Firefox Mobile Talk @ CeBIT 2011
Firefox Mobile Talk @ CeBIT 2011Firefox Mobile Talk @ CeBIT 2011
Firefox Mobile Talk @ CeBIT 2011Carsten Book
 
Moz camp in asia 2012 making strategy and plan of grow mozilla for your country
Moz camp in asia 2012 making strategy and plan of grow mozilla for your countryMoz camp in asia 2012 making strategy and plan of grow mozilla for your country
Moz camp in asia 2012 making strategy and plan of grow mozilla for your countrydynamis
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Mozilla Trans/L10n
Mozilla Trans/L10nMozilla Trans/L10n
Mozilla Trans/L10ndynamis
 
Pwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriPwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriOWASP Delhi
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Worksyu
 
Доставка зловредов через облака
Доставка зловредов через облакаДоставка зловредов через облака
Доставка зловредов через облакаPositive Hack Days
 
Flash Lite in Nokia Devices
Flash Lite in Nokia DevicesFlash Lite in Nokia Devices
Flash Lite in Nokia DevicesRisto Alminen
 
Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...
Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...
Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...North Star. Inc.
 
How FireFox Works
How FireFox WorksHow FireFox Works
How FireFox Workss1170024
 

What's hot (16)

Internet explorer 06
Internet explorer 06Internet explorer 06
Internet explorer 06
 
Mozila firefox The Internet Browser
Mozila firefox The Internet BrowserMozila firefox The Internet Browser
Mozila firefox The Internet Browser
 
Internet explorer tech support call 1 866-757-9494
Internet explorer tech support call 1 866-757-9494Internet explorer tech support call 1 866-757-9494
Internet explorer tech support call 1 866-757-9494
 
Firefox Mobile Talk @ CeBIT 2011
Firefox Mobile Talk @ CeBIT 2011Firefox Mobile Talk @ CeBIT 2011
Firefox Mobile Talk @ CeBIT 2011
 
Moz camp in asia 2012 making strategy and plan of grow mozilla for your country
Moz camp in asia 2012 making strategy and plan of grow mozilla for your countryMoz camp in asia 2012 making strategy and plan of grow mozilla for your country
Moz camp in asia 2012 making strategy and plan of grow mozilla for your country
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Mozilla Trans/L10n
Mozilla Trans/L10nMozilla Trans/L10n
Mozilla Trans/L10n
 
Pwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriPwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit Giri
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Sp W11
Sp W11Sp W11
Sp W11
 
Virus
Virus  Virus
Virus
 
Доставка зловредов через облака
Доставка зловредов через облакаДоставка зловредов через облака
Доставка зловредов через облака
 
Mozilla introduction
Mozilla introductionMozilla introduction
Mozilla introduction
 
Flash Lite in Nokia Devices
Flash Lite in Nokia DevicesFlash Lite in Nokia Devices
Flash Lite in Nokia Devices
 
Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...
Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...
Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...
 
How FireFox Works
How FireFox WorksHow FireFox Works
How FireFox Works
 

Similar to Firefox security (prasanna)

Similar to Firefox security (prasanna) (20)

Firefox (in)Security
Firefox (in)SecurityFirefox (in)Security
Firefox (in)Security
 
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
 
Abusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-ons
 
Elsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the BrowserElsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the Browser
 
Browsers .
Browsers .Browsers .
Browsers .
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Internet browsers by Andres Haydar
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres Haydar
 
Operations security (OPSEC) in IT
Operations security (OPSEC) in ITOperations security (OPSEC) in IT
Operations security (OPSEC) in IT
 
Trabajo de jose
Trabajo de jose Trabajo de jose
Trabajo de jose
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
iOS (Vulner)ability
iOS (Vulner)abilityiOS (Vulner)ability
iOS (Vulner)ability
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
Abusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAbusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox Addons
 
Browsers
BrowsersBrowsers
Browsers
 
browsers MEZH
browsers MEZHbrowsers MEZH
browsers MEZH
 
Browsers
BrowsersBrowsers
Browsers
 

More from ClubHack

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014ClubHack
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreClubHack
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber InsuranceClubHack
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatClubHack
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleClubHack
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...ClubHack
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanClubHack
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaClubHack
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiClubHack
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012ClubHack
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack
 

More from ClubHack (20)

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threat
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep Kamble
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan Joshi
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011
 

Firefox security (prasanna)

  • 1. Firefox (in)Security Prasanna K Dead Pixel
  • 2. What & Who This presentation demonstrates strength of the Mozilla platform and how some of the features could be misused by malicious users. This presentation is intended to dispel a common myth Just using FIREFOX keeps you SECURE
  • 3. Agenda Basic premise Understanding the Mozilla Platform Attacking Firefox Malicious Extensions XCS Some basic points to watch…. That’s All Folks …
  • 4.
  • 8.
  • 9. Mozilla Platform Chrome: It could be used to indicate a “Special Trusted Zone” within the Mozilla Platform
  • 10. Mozilla Platform XUL (pronounced "zool") : Mozilla's XML-based language that lets you build feature-rich cross platform applications that can run connected or disconnected from the Internet. <?xml version="1.0"?> <?xml-stylesheethref="chrome://global/skin/" type="text/css"?> <window id="vbox example" title="Example 3...." xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"> <vbox> <button id="yes" label="Yes"/> <button id="no" label="No"/> <button id="maybe" label="Maybe"/> </vbox> </window>
  • 11. Mozilla Platform XBL: XML-based markup language used to declare the behavior and look of XUL-widgets and XML elements. scrollbar { -moz-binding: url('somefile.xml#binding1'); } -- “binding1” is the id of the binding
  • 12. Mozilla Platform XPCOM: Cross platform component model from Mozilla. Nerve center of the Mozilla platform. XPCOM has some Similarity to CORBA and Microsoft COM.
  • 13. Important Components of Mozilla Platform
  • 15.
  • 16. Review process is manual lapses have been found
  • 17. Over 2 billion add-ons as of today and growing
  • 18. Add-ons can be distributed through Mozilla without review as wellhttps://addons.mozilla.org/en-US/firefox/addon/2230/
  • 19.
  • 20. When installing from any site Mozilla pops a warning but the same message appears on the official site (confusing!).
  • 21.
  • 22. The filename should be the id of the extension to be loaded
  • 23. The content of the file should be the location of the extension codeBeware: When this file exists in the folder the extensions is installed automatically it does not require any human interaction.
  • 24. Extension Security! Mozilla extension security model is completely flat Extension code is treated as fully privilegedby Firefox Vulnerabilities in extension code can result in full system compromise No security boundaries between extensions An extension can silently modify/alter other extensions
  • 25. The Potential Statistics – Firefox Browser Market Share Beyond 20% globally since November 2008, more than 50% in certain regions/countries Source: Marketshare - marketshare.hitslink.com Over 2 billion add-ons and growing
  • 27. Concerns on AMO Everyone can write extension and submit to AMO (even us  ) AMO review process lacks complete security assessment Few extensions signed in AMO. Extensions are generally not “signed”. Users trust unsigned extensions. Experimental extension (not approved yet) are publicly available
  • 29. Extension and Malware Some people have already exploited this concept FormSpy - 2006 Downloader-AXM Trojan, poses as the legitimate NumberedLinks 0.9 extension Steal passwords, credit card numbers, and e-banking login details Firestarterfox - 2008 Hijacks all search requests through multiple search engines and redirects them through Russian site thebestwebsearch.net Vietnamese Language Pack - 2008 Shipped with adware Vietnamese Language Pack - 2008 Shipped with adware Might happen in the near future… Malware authors bribe/hack famous/recommended extension developer/vendor Initial benign extension, malware is introduced in a 3rd/4th update
  • 30. Attacking Firefox ! Now that we have seen the basic architecture & problem, let’s have some fun 
  • 31. Anatomy of an Extension These are the components of every extension. They are archived together into the XPI file format. Sample Files inside a XPI file exampleExt.xpi: /install.rdf /chrome.manifest /chrome/ /chrome/content/ /browser.xul /browser.js
  • 32. Malicious Extensions We will build a malicious extension which will Log all Key Strokes and send them remotely Execute native code Extract stored passwords Add a malicious site to the NoScriptwhitelist DEMO
  • 33. Interesting Finds In the course of making this presentation I found some interesting things
  • 34.
  • 35. XCS injections occur from untrusted to the trusted zone.
  • 36.
  • 37. DOM nodes when dragged and dropped move the properties attributes and behavior
  • 38. An extension that trusts DOM content can be subverted by providing malicious content
  • 39. CreateEvent() DOM function can be used to send malicious content to the extensionDEMO
  • 40.
  • 41. wrappedJSObject can be used to strip the wrapper protection.DEMO
  • 42. What Can We Look For? Suspicious single file(s) in the extension folder. XPI are archives - can be un-Zipped and checked for any packaged executables Check the install.rdf for common pitfalls mainly <em:hidden> Verify chrome.manifest does not point to other extension folders as it can overwrite functionality.
  • 43. What Should a Developer Do? That’s a whole presentation by itself Don’t bypass wrappers Don’t trust content From the un-trusted context. Don’t use eval() Follow this link : https://developer.mozilla.org/en/Security_best_practices_in_extensions
  • 44. Tools Firebug XULWebDeveloper XPComViewer Venkman Console2 Burp
  • 45. Last Words We discussed some ways to subvert the Mozilla Platform This list is not by any means exhaustive There are some strategies like sandboxes which can be bypassed New features like themes open new avenues ! Last, Mozilla is a secure platform but can be made to do lots of tricks… So some care should be taken.
  • 47. Thank You prasanna@deadpixel.org

Editor's Notes

  1. Xp Connect is the scripting front end to underlying Xpcom interfaces
  2. Introduction to extensions
  3. Xp Connect is the scripting front end to underlying Xpcom interfaces
  4. Discuss about Z:\\
  5. Xp Connect is the scripting front end to underlying Xpcom interfaces