Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile platform equivalents. Beyond individual vulnerabilities with CVE numbers or system compromises, we are solely focused on new and creative methods of Web-based attack. Now in its eighth year, the Top 10 Web Hacking Techniques list encourages information sharing, provides a centralized knowledge base, and recognizes researchers who contribute excellent work. Past Top 10s and the number of new attack techniques discovered in each year:
2006 (65), 2007 (83), 2008 (70), 2009 (82), 2010 (69), 2011 (51) and 2012 (56).
Phase 1: Open community voting for the final 15 [Jan 23-Feb 3]
Each attack technique (listed alphabetically) receives points depending on how high the entry is ranked in each ballot. For example, an entry in position #1 will be given 15 points, position #2 will get 14 points, position #3 gets 13 points, and so on down to 1 point. At the end all points from all ballots will be tabulated to ascertain the top 15 overall. Comment with your vote!
Phase 2: Panel of Security Experts Voting [Feb 4-Feb 11]
From the result of the open community voting, the final 15 Web Hacking Techniques will be ranked based on votes by a panel of security experts. (Panel to be announced soon!) Using the exact same voting process as phase 1, the judges will rank the final 20 based on novelty, impact, and overall pervasiveness. Once tabulation is completed, we’ll have the Top 10 Web Hacking Techniques of 2013!
Complete 2013 List (in no particular order):
- Tor Hidden-Service Passive De-Cloaking
- Top 3 Proxy Issues That No One Ever Told You
- Gravatar Email Enumeration in JavaScript
- Pixel Perfect Timing Attacks with HTML5
- Million Browser Botnet Video Briefing
Slideshare - Auto-Complete Hack by Hiding Filled in Input Fields with CSS
- Site Plagiarizes Blog Posts, Then Files DMCA Takedown on Originals
- The Case of the Unconventional CSRF Attack in Firefox
- Ruby on Rails Session Termination Design Flaw
- HTML5 Hard Disk Filler™ API
- Aaron Patterson – Serialized YAML Remote Code Execution
- Fireeye – Arbitrary reading and writing of the JVM process
- Timothy Morgan – What You Didn’t Know About XML External Entity Attacks
- Angelo Prado, Neal Harris, Yoel Gluck – BREACH
- James Bennett – Django DOS
- Phil Purviance – Don’t Use Linksys Routers
- Mario Heiderich – Mutation XSS
- Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval
- Carlos Munoz – Bypassing Internet Explorer’s Anti-XSS Filter
- Zach Cutlip – Remote Code Execution in Netgear routers
- Cody Collier – Exposing Verizon Wireless SMS History
- Compromising an unreachable Solr Serve
- Finding Weak Rails Security Tokens
- Ashar Javad Attack against Facebook’s password reset process.
- Father/Daughter Team Finds Valuable Facebook Bug
- Hacker scans the internet
- Eradicating DNS Rebinding with the Extended Same-Origin Policy
- Large Scale Detection of DOM based XSS
- Struts 2 OGNL Double Evaluation RCE
- Lucky 13 Attack
- Weaknesses in RC4
Leave a comment if you know of some techniques that we’ve missed, and we’ll add them in up until the submission deadline.
Final 15 (in no particular order):
- Million Browser Botnet Video Briefing
Slideshare - Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval
- Hacker scans the internet
- HTML5 Hard Disk Filler™ API
- Eradicating DNS Rebinding with the Extended Same-Origin Policy
- Aaron Patterson – Serialized YAML Remote Code Execution
- Mario Heiderich – Mutation XSS
- Timothy Morgan – What You Didn’t Know About XML External Entity Attacks
- Tor Hidden-Service Passive De-Cloaking
- Auto-Complete Hack by Hiding Filled in Input Fields with CSS
- Pixel Perfect Timing Attacks with HTML5
- Large Scale Detection of DOM based XSS
- Angelo Prado, Neal Harris, Yoel Gluck – BREACH
- Weaknesses in RC4
- Lucky 13 Attack
Prizes [to be announced]
- The winner of this year’s top 10 will receive a prize!
- After the open community voting process, two survey respondents will be chosen at random to receive a prize.
The Top 10
- Mario Heiderich – Mutation XSS
- Angelo Prado, Neal Harris, Yoel Gluck – BREACH
- Pixel Perfect Timing Attacks with HTML5
- Lucky 13 Attack
- Weaknesses in RC4
- Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval
- Million Browser Botnet Video Briefing
Slideshare - Large Scale Detection of DOM based XSS
- Tor Hidden-Service Passive De-Cloaking
- HTML5 Hard Disk Filler™ API
Honorable Mention
No comments:
Post a Comment