Hacklog Volume 1 Anonymity: it security & Ethical Hacking Handbook



Download 2,32 Mb.
Pdf ko'rish
bet29/57
Sana01.01.2022
Hajmi2,32 Mb.
#289651
1   ...   25   26   27   28   29   30   31   32   ...   57
Bog'liq
Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook

6.6 Flash
Developed  by  Macromedia  and  later  acquired  by  Adobe,  Flash  technology
contributed  to  make  the  interactive  media  format  accessible  to  all  the  Internet
users in the last decade. Before going on, we must state that Flash is dead. Or,
better, it is dying. According to statistical data, less than 1% of websites still use
Flash in 2018, Chrome browser have disabled it since 2017, followed by Firefox,
one  year  later.  Adobe  itself  announced  they  will  deprecate  such  technology  in
favor  of  HTML5,  the  new  web  standard.  However,  if  Flash  will  end  like
Windows  XP,  we  can  surely  expect  to  see  this  application  installed  at  least  for
another 10 years!
6.6.1 Flash impact over security
Flash  Player  has  been  criticized  by  many  researchers  who  deemed  it  as
dangerous  for  users,  instable  and  poorly  performing.  Since  the  latest  version,
released in January, there are hundreds, maybe thousands of vulnerabilities yet to


be fixed
[70]
, and this proves how it can become a time bomb when installed on a
computer.
6.6.2 Controlling Flash
The only recommendation I can make is: uninstall it completely. If you need
it, refer to the “Controlling JavaScript” section, since all the extensions/add-ons
listed there can also block the Flash Player.
6.7 Java
Java  is  a  popular  programming  language  among  the  developers  across  the
web  (although  if  it  recently  lost  some  of  its  appeal,  it  gained  new  popularity
thanks to Android) and has given birth to very good web applications for years.
Recently, however, the HTML5 technologies and browsers in general are getting
more  and  more  popular,  placing  the  Web  Java  as  a  niche  language.  It  is  still  a
valuable tool to date, of course, especially if used to fully leverage the hardware
available  in  the  market.  Keep  in  mind,  however,  that  most  of  the  modern
browsers are going to abandon it soon. Consequently, sooner or later Java may
become deprecated in the web sector.
6.7.1 Java impact over security
The older versions of Java were under discussion, since it was impossible to
setup a SOCKS4/5 proxy externally, thus forcing users to completely disable it.
The problem has been fixed in the latest versions with a new feature; hopefully,
the  development  team  will  better  document  such  new  possibility.  Nevertheless,
we  suggest  you  to  completely  disable  the  Java  client,  because  a  misconfigured
browser  may  cause  a  DNS  leak  (which  has  been  thoroughly  explained  in  the
VPN chapter).
6.7.2 Controlling Java
You can disable the Java client using the same tools already outlined in the
Controlling  JavaScript”  paragraph.  However,  if  you  still  need  it,  we  suggest
you  to  use  Orchid
[71]
,  an  experimental  browser  based  on  Tor  Browser,  which
fully supports the Java libraries, even on Android devices.
6.8 ActiveX
ActiveX is an extension created by Microsoft to... extend the functionalities


of the Internet Explorer browser. Even if not too popular in Europe (differently
from Far-Eastern applications, like IP Cameras), it permits to completely control
the machine running it, allowing operations that can potentially compromise the
whole user’s system.
6.8.1 ActiveX impact over security
As  you  can  imagine,  ActiveX  is  an  extremely  dangerous  tool,  if  used  by
criminals. Fortunately, it is not too popular, and has been deprecated by almost
all  the  public  services.  You  should  keep  in  mind,  however,  that  regardless  of
staying anonymous or not, an ActiveX can penetrate the host device and infect it
with any kind of malware and trojans, compromising any anonymization effort.
6.8.2 Controlling ActiveX
Since  we  cannot  know  the  nature  of  each  single  ActiveX  application,  we
strongly discourage you from executing the ones with an untrusted source. If you
run an application executing a separated Internet connection, you have to ensure
that  the  entire  System  is  configured  to  the  external  connection  through
Proxy/VPN/Tor.  If  possible,  you  should  also  verify  the  origin  of  each  single
application  certificate  (the  digital  signatures)  and  their  integrity.  In  case  of
doubts,  never  allow  the  client-side  executions  (this  option  is  only  available  on
Windows XP SP2 and later versions).
6.9 WebRTC
WebRTC is the new technology, established in 2011, allowing to make video
chats  with  a  browser,  using  the  HTML5  and  JavaScript  languages.  Such
technology is pre-installed on next generation browsers and OSs
[72]
and can be
currently  used  in  services  like  Firefox  Hello,  Google  Hangouts,  Skype  (web
version), Facebook Messenger and so on.
6.9.1 WebRTC impact over security
Being  a  relatively  new  technology  (it’s  only  5  years  old!),  there’s  only  a
small  number  of  case-histories.  Actually,  there  is  only  one.  According  to  a
research conducted by TorrentFreak
[73]
, a remote site can leverage the WebRTC
protocol  to  reveal  the  real  IP  address  of  a  user,  even  if  they  are  connected  to  a
VPN or a TOR network. And it’s not only limited to the public address, since it
can also reveal the local one!


Are  you  paranoid?  Well,  you  may  be  right;  however,  this  vulnerability  is
(hopefully)  leveraged  only  by  a  few  portals.  Nevertheless,  try  to  connect  to  a
VPN and visit the test address
[74]
. If your real IP address is shown (whether it is
the  local  or  the  remote  one)  –  notwithstanding  the  VPN  or  other  systems
spoofing  your  IP  –  then  you  are  vulnerable.  You  can  further  explore  this
Download 2,32 Mb.

Do'stlaringiz bilan baham:
1   ...   25   26   27   28   29   30   31   32   ...   57




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish