Jeremy Grossman: I am glad to welcome all of you and I want to say that we have been preparing this presentation for 6 months, so we are trying to share our achievements as soon as possible. I want to thank the entire Black Hat staff for the invitation, we come back here every year, we love this event. Thank you for the "Black Hat"! We will try to make today's presentation fun, but first we want to introduce ourselves.

I am the founder and head of product development at WhiteHat Security, located in Santa Clara, California. Our company has about 300 employees.
')
Matt works as a security threat research center manager. For the “whiteheads,” we mainly focus on breaking into websites, finding vulnerabilities in them and doing it on a massive scale. But we still have a little time for research, so today we are going to start hacking browsers and use them to hack sites and show you the full cycle of web security. I first spoke here in 2002. Most of the time I do research in the development and presentation of our products.
Matt Johanson: I have experience working as a penetration tester (pentester), and I started my work in the company by hacking websites, since before that I myself headed an army of hackers. I do some cool research and take a lot of it, so you can contact me.

Jeremy Grossman: So let's start our party. I do not think that there is at least one person here who hasn’t entered the Internet today. Maybe now you are not connected to the Internet, but when you come home, everyone present here and everyone you know will all interact with it using a browser. This is just a part of our daily life, and I will describe to you what this means, but first of all the Internet is meant for work. We do not break the Internet, we try to use it for our purposes.
When you visit a web page, it does not matter which browser is being used — Chrome, Firefox, Safari, IE or Opera — in any case, the Internet works in such a way that it completely controls your browser while you are on this page or when you are looking for the next page.
JavaScript or flash on this page can force the browser to do anything - any type of response to requests to any place on the Internet or intranet. This includes CSRF - fake cross-site requests, XSS - cross-site scripting, clickjacking, and many other tricks that allow you to gain control over the browser.
Now we will try to gain some understanding of what browser security is, but the basic idea is to get a general idea of ​​browser control without using zero-day exploits, against which there are no patches.
Matt Johanson: If you don't know anything about XSS, you can ask us about it.
Jeremy Grossman: Now I want to briefly talk about browser attacks that use HTML or malicious JavaScript: