random dross

Web security and beyond...

  • random dross

    An innovative new defense against cross-domain vulnerabilities

    • 1 Comments
    Cross-domain (or “Universal XSS”) vulnerabilities have long plagued modern script-enabled web browsers. Shuo Chen of Microsoft Research has developed a new type of defense against these vulnerabilities. A paper on this new approach has been accepted to...
  • random dross

    Pinning / Rebinding / Quick-Swap DNS Links

    • 0 Comments
    A group at Stanford has been researching these issues and recently published Protecting Browsers from DNS Rebinding Attacks . Also, Dan Kaminski has published his slides from Blackhat 2007, Black Ops 2007: Design Reviewing The Web .
  • random dross

    Notes on DNS Pinning

    • 1 Comments
    Christian Matthies has an excellent writeup on DNS Pinning (with diagrams!) If you're tuned into web app security you've probably noticed a lot of discussion around Anti DNS Pinning a.k.a. DNS Rebinding a.k.a. Quick-Swap DNS lately. You're likely to see...
  • random dross

    Inspect Your Gadget

    • 0 Comments
    Michael Howard and I have written up some guidance on how to develop secure Vista Sidebar Gadgets: Inspect Your Gadget
  • random dross

    De-obfuscation using a standalone Javascript interpreter

    • 0 Comments
    Mark Wodrich forwarded me this Websense blog post describing how to use a standalone Javascript interpreter to de-obfuscate some script. Thanks Mark!
  • random dross

    eval() and document.write(), meet Execute and ExecuteGlobal

    • 0 Comments
    Be on the lookout for these two VBScript statements that can be used to achieve the same effect as eval() and document.write(): Execute and ExecuteGlobal . Jonathan Ness pointed me to an exploit sample that was using Execute, presumably to trip up...
  • random dross

    Recursive Obfuscation

    • 0 Comments
    Thanks to Jonathan Ness for pointing me to an example of a new obfuscation technique that attempts to thwart the eval() à alert() trick . Take a look at the following obfuscation script: 1 <script> 2 function N(F,D) 3 { 4 if (!D) D = ' "#%()-./012348...
  • random dross

    High-bit ASCII obfuscation

    • 1 Comments
    Here’s another new obfuscation technique I’ve seen in use on malicious web sites recently. Check out the following HTML: <html><meta http-equiv=content-type content='text/html; charset=us-ascii'></head><body>¼óãòéðô¾áìåòô¨¢Ôèéó...
  • random dross

    Code length dependent obfuscation

    • 2 Comments
    Wow, it’s been a long time! Hopefully I can find more time to blog over the next couple of months. In any event, my paper from last year really could use some updates. Among other things there are a whole new slew of “Usual Suspect” vulnerabilities to...
  • random dross

    Analyzing Browser Based Vulnerability Exploitation Incidents

    • 0 Comments
    I've written up a paper that describes some useful tools/techniques for deconstructing web based exploits: Analyzing Browser Based Vulnerability Exploitation Incidents The paper started as a blog entry and it remains a blog entry at its core. But...
  • random dross

    Hello!

    • 0 Comments
    Hi! I'm David Ross and this is my work blog. As an engineer on the Microsoft Secure Windows Initiative at Microsoft I specialize in browser and web application security.
Page 2 of 2 (36 items) 12