Website Hacking
Website Hacking
August 2, 2003
This document is solely for the presentation of Twingo Systems. No part of it may be circulated, quoted, or reproduced for distribution without prior written approval from
Twingo Systems. By reading this document, the Receiving Party agrees:
(i) to hold the Disclosing Partys Proprietary Information in confidence and to take reasonable precautions to protect such Proprietary Information (including, without
limitation, all precautions the Receiving Party employs with respect to its confidential materials),
(ii) not to divulge any such Proprietary Information or any information derived there from to any third person,
(iii) not to make any use whatsoever at any time of such Proprietary Information except to evaluate internally its relationship with the Disclosing Party
(iv) not to copy or reverse engineer any such Proprietary Information and not to export or reexport (within the meaning of U.S. or other export control laws or
regulations) any such Proprietary Information or product thereof.
AGENDA
How to defend?
Conclusion
Questions and Answers
Firewall, intrusion
detection, anti-virus,
AGENDA
How to defend?
Conclusion
Questions and Answers
DEMOS
AGENDA
How to defend?
Conclusion
Questions and Answers
As you will see through this presentation, the attack is extremely generic and can lead to a lot of
malicious scenarii.
The installed DLL cannot be detected by anti-virus. This is a standard DLL with no specific
signature or whatsoever
AGENDA
How to defend?
Conclusion
Questions and Answers
10
11
12
13
14
Register the DLL (regsvr32.exe myBHO.dll for instance) and create a key in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows\CurrentVersion\Explorer\Browser
Helper Objects with the GUID of the component
The next instance of Internet Explorer will automatically load the BHO
15
AGENDA
How to defend?
Conclusion
Questions and Answers
16
17
18
AGENDA
How to defend?
Conclusion
Questions and Answers
19
CONCLUSION
You should not trust what you see (especially if this is not your computer)
20
CONTACT INFORMATION
Main contact:
Gregoire Gentil
CEO and CTO of Twingo Systems
gregoire@twingosystems.com
Company:
21
AGENDA
How to defend?
Conclusion
Questions and Answers
22
23