Showing posts with label Internet Explorer. Show all posts
Showing posts with label Internet Explorer. Show all posts

Thursday, June 7, 2007

Firefox and IE - browsers vulnerabilities

In the 4th of jun Michal Zalewski made public at http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063712.html a list of 4 vulnerabilities of Mozilla Firefox and Microsoft Internet Explorer.
There is one critical problem at the IE with the access to the cookies of some pages by third part pages. A major problem in Firefox with the iframes that could include javascript injection. Ant other two midium problems, one for the browser provided by Mozilla and the other for the Microsoft's browser.
You will find interesting the last one, here is a demo of how you can be triked that you are visiting the real cnn page.

Monday, January 29, 2007

GMail has about 3 GB - you could use it like a drive

You can use it on your computer by installing an application that will do to access the drive easier, or you could use it from the net.
The first method is very easy to use (too bad you can't see the drive in Total Commander, but the Windows Explorer will do). You just have to:
1. Download the GMail Drive shell extension 1.0.10 from here.
2. Extract he files from the archive and run setup.exe
3. Access the new drive in Windows Explorer - it will ask you to log in (you know that Windows Explorer is something like Internet Explorer but with some other default tools, so when you copy files on that drive you just upload a file into an email sent to you, and when you copy from it you just download that file, so don't expect extra speed).
Look at the tips on the download page that I gave you above. It is nice to put a filter to your uploaded files.
Here you can see a little illustration how it works:


The method number two:
But sometimes you want to access your files not only on your computer, but somewhere else, at school, where you have no time or will to install that application. You can use this page witch is user friendly, and uses the same GMail. It is xMailHardDrive page powerredby BlackBox.
I saw this site is in the beta version, and sometimes you need patience with it. This guy from the clip above say that is is ok. It wasn't for me...

If the second method doesn't work, try downloading files from your GMail inbox (that's kind of third method), that sure will work, it will be just harder to upload files, but for that you better use the first method from home, where you have the drive installed.

Sunday, November 26, 2006

Critical Firefox hole allows password theft (IE - FF | 1 : 0)

Vulnerability lies in browser's Password Manager software

A flaw in Mozilla Corp.'s Firefox browser makes it easy for cybercriminals to steal user information on Web sites where users create their own pages, such as MySpace.com.

The flaw lies in Firefox's Password Manager software, which can be tricked into sending password information to an attacker's Web site, said Robert Chapin, president of Chapin Information Services Inc. For this attack to work, attackers need to be able to create HTML (Hypertext Markup Language) forms on the Web site, something that is allowed on blogging and social networking sites.

The attack was used in a MySpace phishing attack reported in late October. In that attack, users registered a MySpace account named login_home_index_html and used it to host a fake log-in page that exploited the flaw.

This page sent MySpace username and password information to another Web site, and MySpace users who visited the page using Firefox could have easily had their information compromised, said Chapin.

Firefox developers rate this bug critical, according to an entry in the project's Bugzilla database.

The flaw arises because Firefox's Password Manager does not perform a thorough enough check when it is deciding whether to send password information, and then does not ensure that password information is being sent to the server that requested it, Chapin said. In the MySpace attack, for example, Firefox would check to see if the form was coming from the MySpace.com domain, but did not make sure that the password information was being sent back to a MySpace server.

"From a programming point of view, this is almost like a typo," he said. "Ironically I think that's why it hasn't been discovered until now. It was just way too obvious."

Chapin has posted an analysis of this type of attack, which he has dubbed a Reverse Cross-Site Request, as well as a demonstration of how it works.

Microsoft Corp.'s Internet Explorer (IE) is also susceptible to these type of attacks because, like Firefox, it does not ensure that password information is being sent to the same server that requests it, Chapin said.

But IE is less likely to be tricked because it does a more thorough job in checking to see where the log-in form is coming from before it automatically submits password and user information, he added.