Bypass Surgery - Abusing Content Delivery Networks
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities and attack patterns affecting Content Delivery Networks (CDNs) in this Black Hat conference talk. Delve into the potential consequences of exploiting CDN weaknesses, including unauthorized access to sensitive information and financial accounts. Learn about the research uncovering general attack patterns against high-availability website infrastructure. Discover techniques such as SRV record enumeration, internal network assessment, and SSRF tools. Examine the differences between JavaScript and Flash in terms of security, and understand the implications of crossdomain.xml files. Investigate methods for bypassing HTTP Content Security Policy and potential remediation strategies. Gain insights into future security research directions in this critical area of web infrastructure.
Syllabus
Intro
Matthew Bryant (mandatory)
Content Delivery Networks
What happened?
A Divided Penetration Testing Scope
SRV Record Enumeration
subbrute - Internal Network Assessment
NOERROR?
Server Trust
Search for Cross Domain Proxy
SSRF tools
Access to the Web Server's localhost
Access to Internal Network Hardware
SSRF Questions
What's an origin?
Differences between JavaScript and Flash
Example Crossdomain.xml File
The Check
FlowPlayer Bypass #1 - The Bypass
Full Exploit Flow
Bypassing HTTP Content Security Policy
Remediation
Future Security Research
Taught by
Black Hat
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent