Do you know what’s leaking out of your browser?

Status
Not open for further replies.

morpheusv6

Journeyman
Just saw this on zdnet.com. Great article, scary though.

Information seeping out of your Web browser could provide a gold mine for hackers doing reconnaissance for targeted attacks.
At the ToorCon Seattle (beta) conference, Web application security specialist Robert Hansen (RSnake) demoed Mr-T (Master Recon-Tool), a new utility that combines information disclosure flaws in Internet Explorer and Firefox to collect information on a target's computer system.
For a basic idea of the kinds of information your browser is willingly coughing up, click on this link and you'll see a snapshot of your machine, including the browser version, the add-ons installed and enabled, your ISP hostname, a list of previously visited Web sites and, in some instances, your Gmail address.
RSnake explains:
Mr. T combines all that into one place so that you can gather a great deal of client based info through a single XSS hole. Then by taking the DOM and dumping it into a form that you submit to a logging server, you can know pretty much everything you want to know about breaking into the machine in question.
*blogs.zdnet.com/security/images/mr_t.jpg
Basically, a hacker can lure a specific target to a Web site and collect enough information to prepare an attack. This becomes even more scary when you take into account that even before you visit a Web site, your computer is already broadcasting all kinds of data that can be used to prepare a solid profile of a target.
Earlier this year at Black Hat DC, Errata Security's Robert Graham released Ferret, a souped-up sniffer that gathers all the benign data that seeps out when you turn on your computer. For example, even before your machine fully boots up, it is already broadcasting the list of Wi-Fi access-points you've got cached on your computer, the previous IP address you used (requested by DHCP), your NetBIOS name, your login ID, and a list of servers (via NetBIOS request) you want connections to.
Combine the data from Ferret with a reconnaissance tool like Mr-T and you can get a basic idea of the data your machine is broadcasting to the world.
Another tool I saw recently that fits into this data profiling realm is Evolution, a data correlation/search utility written by South African hacker Roelof Temmingh. Evolution, which is currently in beta, provides an interface to connect publicly available data.
The idea behind Evolution fits into the Mr-T/Ferret concept because you can basically type in a person's name into the search interface and see how that name connects to domain names, IP addresses, telephone numbers and other things of interest to an attacker.
When I chatted with Temmingh at CanSecWest earlier this year, he was positioning Evolution as a forensics tool for law enforcement and other investigators but, anyone with access to a database of valuable information (think about Ferret's output) can build out a fairly solid profile of a target.
Once you know what's running on your target's machine, the types of sites he visits, the company he keeps (say, MySpace or LinkedIn connections), you can easily prepare an attack.
What's even more scary is there's very little you can do about it.




source: *blogs.zdnet.com/security/?p=197&tag=nl.e622
 

eagle_y2j

Youngling
Code:
Master Reconnaissance Tool
Environmental variables:

    HTTP_ACCEPT = */*
    HTTP_ACCEPT_CHARSET = ISO-8859-1,utf-8;q=0.7,*;q=0.7
    HTTP_ACCEPT_ENCODING = gzip,deflate
    HTTP_ACCEPT_LANGUAGE = en-us,en;q=0.5
    HTTP_CONNECTION = keep-alive
    HTTP_KEEP_ALIVE = 300
    HTTP_USER_AGENT = Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.3) Gecko/20061201 Firefox/2.0.0.3 (Ubuntu-feisty)
    REMOTE_ADDR = 59.94.141.**
    REMOTE_PORT = 50305
    REQUEST_METHOD = GET
    SERVER_PROTOCOL = HTTP/1.1

Derived Information:

    It appears you are not using Tor

Browser detection:

    IE7.0 not detected
    JavaScript Version: 1.7
    Browser type: Netscape
    User Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.3) Gecko/20061201 Firefox/2.0.0.3 (Ubuntu-feisty)
    User Language: en-US
    Cookies Enabled: true
    Application Version: 5.0 (X11; en-US)
    Platform: Linux i686
    Application Code Name: Mozilla
    OS CPU: Linux i686
    On line: true
    Product: Gecko
    Product Sub: 20061201
    Application Code Name: Mozilla
    Java Enabled: true
    Your Intranet IP:
    Document referrer: http%3A//www.thinkdigit.com/forum/showthread.php%3Fp%3D501889

Browser Plugins (5):

    * Plugin name: Totem Web Browser Plugin 2.18.1
          o Filename: libtotem-basic-plugin.so
          o Description: The Totem 2.18.1 plugin handles video and audio streams.
          o Mime info: application/ogg Ogg multimedia ogg enabled
          o Mime info: video/mpeg MPEG video mpg, mpeg, mpe enabled
          o Mime info: audio/wav WAV audio wav enabled
          o Mime info: audio/mpeg MP3 audio mp3 enabled 
    * Plugin name: Windows Media Player Plug-in 10 (compatible; Totem)
          o Filename: libtotem-gmp-plugin.so
          o Description: The Totem 2.18.1 plugin handles video and audio streams.
          o Mime info: application/x-mplayer2 AVI video avi, wma, wmv enabled
          o Mime info: video/x-ms-asf-plugin ASF video asf, wmv enabled
          o Mime info: video/x-msvideo AVI video asf, wmv enabled
          o Mime info: video/x-ms-asf ASF video asf enabled
          o Mime info: video/x-ms-wmv WMV video wmv enabled
          o Mime info: video/x-wmv WMV video wmv enabled
          o Mime info: video/x-ms-wvx Playlist wmv enabled
          o Mime info: video/x-ms-wm ASF video wmv enabled 
    * Plugin name: DivX® Web Player
          o Filename: libtotem-mully-plugin.so
          o Description: The Totem 2.18.1 plugin handles video and audio streams.
          o Mime info: video/divx AVI video divx enabled 
    * Plugin name: QuickTime Plug-in 7.1.3
          o Filename: libtotem-narrowspace-plugin.so
          o Description: The Totem 2.18.1 plugin handles video and audio streams.
          o Mime info: video/quicktime QT video mov enabled
          o Mime info: video/mp4 MPEG-4 video mp4 enabled
          o Mime info: image/x-macpaint MacPaint Bitmap image pntg enabled
          o Mime info: image/x-quicktime Macintosh Quickdraw/PICT drawing pict, pict1, pict2 enabled 
    * Plugin name: Shockwave Flash
          o Filename: libflashplayer.so
          o Description: Shockwave Flash 9.0 r31
          o Mime info: application/x-shockwave-flash Shockwave Flash swf enabled
          o Mime info: application/futuresplash FutureSplash Player spl enabled 


Firefox plugin detection:


JavaScript variables:

    Window width = 1024
    Window height = 573
    Available Screen Height = 719
    Available Screen Width = 1024
    Color Depth = 16
    Pixel Depth = 16

Some sites you have visited:

    * *mail.google.com/
    * *mail.yahoo.com/
    * *www.blogger.com/
    * *www.yahoo.com/

Local host (Note: if Localrodeo is installed this may not work):

this is normal detection report for server we connect ?isn't it
 

Zeeshan Quireshi

C# Be Sharp !
ax3 said:
DAMN scary man ...............


"SO V R HUNTED BY ANY smart HUNTER " ..................
this is the normal stuff sent by the HTTP protocol , nothin to be scared bout .

coz if u see all da headers send by your browser in a normal browsing session , it will boggle you :D
 

mediator

Technomancer
It seems pretty obvious and simple to me. Its a hacker's site and some lamer guy just wanna show his noobie skills!
 

anandk

Distinguished Member
i get a blank page !?
with error acess denied to code
(vista ulti/maxthon on ie7/kis)
 

Vyasram

The pWnster
Re: Do you know what’s leaking out of your browser?

how's this

*www.danasoft.com/sig/vyasram.jpg

detecting such things is nothing
 

rakeshishere

HELP AND SUPPORT
I Feel..if any1 is on internet..He is not Alone :)
There is No Full protection,Privacy and security present all the Time;)
 

freshseasons

King of my own Castle
eagle_y2j said:
but wat bout email address ?
*blogs.zdnet.com/security/images/mr_t.jpg
I cant see the email option anywhere when i click the link.I dont know how it detected your..!
What Os are you using ...and the java runtime is it 1.6.0 or later..?
 

eagle_y2j

Youngling
Re: Do you know what’s leaking out of your browser?

freshseasons said:
I cant see the email option anywhere when i click the link.I dont know how it detected your..!
What Os are you using ...and the java runtime is it 1.6.0 or later..?

I m using Suse 10.2 with no JAVA ....but it didn't detected my address also I was concern with screenshot with mail address
 
Status
Not open for further replies.
Top Bottom