Año tras año la empresa WhiteHat Security lanza un concurso para encontrar las mejores técnicas de hackeo web, dando a los participantes la oportunidad de publicar sus métodos en, blogs, papers, revistas, listas de correo e incluso presentarse en conferencias a exponer sus técnicas.
La fase de competencia para elegir las mejores técnicas esta dividida en dos fases: la primera es una votación abierta a la comunidad, la cual entrega un sistema de puntuación o ranking a los participantes. De ahí los seleccionados pasan a ser evaluados de la misma manera, solo que ahora por un jurado de expertos en la materia.
Aquí el listado de los top 10
- Mario Heiderich – Mutation XSS
- Angelo Prado, Neal Harris, Yoel Gluck – BREACH
- Pixel Perfect Timing Attacks with HTML5
- Lucky 13 Attack
- Weaknesses in RC4
- Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval
- Million Browser Botnet Video Briefing
Slideshare - Large Scale Detection of DOM based XSS
- Tor Hidden-Service Passive De-Cloaking
- HTML5 Hard Disk Filler™ API
Aquí la lista de los seleccionados del 2013:
- Tor Hidden-Service Passive De-Cloaking
- Top 3 Proxy Issues That No One Ever Told You
- Gravatar Email Enumeration in JavaScript
- Pixel Perfect Timing Attacks with HTML5
- Million Browser Botnet Video Briefing
Slideshare - Auto-Complete Hack by Hiding Filled in Input Fields with CSS
- Site Plagiarizes Blog Posts, Then Files DMCA Takedown on Originals
- The Case of the Unconventional CSRF Attack in Firefox
- Ruby on Rails Session Termination Design Flaw
- HTML5 Hard Disk Filler™ API
- Aaron Patterson – Serialized YAML Remote Code Execution
- Fireeye – Arbitrary reading and writing of the JVM process
- Timothy Morgan – What You Didn’t Know About XML External Entity Attacks
- Angelo Prado, Neal Harris, Yoel Gluck – BREACH
- James Bennett – Django DOS
- Phil Purviance – Don’t Use Linksys Routers
- Mario Heiderich – Mutation XSS
- Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval
- Carlos Munoz – Bypassing Internet Explorer’s Anti-XSS Filter
- Zach Cutlip – Remote Code Execution in Netgear routers
- Cody Collier – Exposing Verizon Wireless SMS History
- Compromising an unreachable Solr Serve
- Finding Weak Rails Security Tokens
- Ashar Javad Attack against Facebook’s password reset process.
- Father/Daughter Team Finds Valuable Facebook Bug
- Hacker scans the internet
- Eradicating DNS Rebinding with the Extended Same-Origin Policy
- Large Scale Detection of DOM based XSS
- Struts 2 OGNL Double Evaluation RCE
- Lucky 13 Attack
- Weaknesses in RC4
Y aquí los 15 seleccionados:
- Million Browser Botnet Video Briefing
Slideshare - Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval
- Hacker scans the internet
- HTML5 Hard Disk Filler™ API
- Eradicating DNS Rebinding with the Extended Same-Origin Policy
- Aaron Patterson – Serialized YAML Remote Code Execution
- Mario Heiderich – Mutation XSS
- Timothy Morgan – What You Didn’t Know About XML External Entity Attacks
- Tor Hidden-Service Passive De-Cloaking
- Auto-Complete Hack by Hiding Filled in Input Fields with CSS
- Pixel Perfect Timing Attacks with HTML5
- Large Scale Detection of DOM based XSS
- Angelo Prado, Neal Harris, Yoel Gluck – BREACH
- Weaknesses in RC4
- Lucky 13 Attack
Resultados de años anteriores:2006 (65), 2007 (83), 2008 (70), 2009 (82), 2010 (69), 2011 (51) y 2012 (56).
Fuente: http://blog.whitehatsec.com/top-10-web-hacking-techniques-2013/
0 comentarios:
Publicar un comentario