Bypass Surgery Abusing Content Delivery Networks With Ser Side Request Forgery

Subscribers:
6,150
Published on ● Video Link: https://www.youtube.com/watch?v=6lTENiMydaw



Duration: 46:25
2 views
0


It is unlikely when a bug affects almost every CDN and it becomes vulnerable, but when this happens the possibilities are endless and potentially disastrous.

Imagine - a Facebook worm giving an attacker full access to your bank account completely unbeknownst to you, until seven Bentleys, plane tickets for a herd of llamas, a mink coat once owned by P. Diddy, and a single monster cable all show up on your next statement. What a nightmare.

But in all seriousness, thousands of websites relying on the most popular CDNs are at risk. While some application requirements may need a security bypass in order to work, these intentional bypasses can become a valuable link in an exploit chain. Our research has unveiled a collection of general attack patterns that can be used against the infrastructure that supports high availability websites.

This is a story of exploit development with fascinating consequences.
PRESENTED BY
Mike Brooks, Matthew Bryant

Black Hat - USA - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
hacking
attack
digital
virus
information
hack
online
password
code
web
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
theft
system
firewall
communication
privacy
binary
account
spy
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Mike Brooks
Matthew Bryant
bypass
abusing content