Description: https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-shawn_moyer-nathan_hamiel-weaponizing_the_web.pdf
https://www.defcon.org/images/defcon-17/dc-17-presentations/Shawn_Moyer-Nathan_Hamiel/defcon-17-moyer-hamiel-weaponizing_the_web-wp.pdf
https://www.defcon.org/images/defcon-17/dc-17-presentations/Shawn_Moyer-Nathan_Hamiel/defcon-17-moyer-hamiel_monkeyfist_v04.zip
Ultimately, basing the value proposition of your site on user-generated and external content is a kind of variant on Russian Roulette, where in every turn the gun is pointed at your head, regardless of the number of players. You may win most of the time, but eventually a bullet is going to find its way into the chamber with your name on it.
We spent some time last year looking at this problem as it related specifically to Social Networks, but that left a lot of the territory unexplored. This time around we'll be talking about a previously unnoticed attack vector for lots and lots of web applications with user-generated content, and releasing a handy tool to exploit it. Bundled in are some thoughts on Web 2.0 attack surface, a few new exploitation techniques, and as in last year, a hefty helping of lulz, ridicule, and demos-of-shame at the expense of a few of your and (our) favorite sites.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 17 , Defcon 17 , dc-17 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.