14
A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

  • View
    225

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

A Hacker's Perspective

Kamran Bilgrami / Angelo Chan

Silverlight Security

Page 2: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Agenda

• Silverlight overview• Scope• Key concepts• Demos• Recommendations• Q&A

    

Page 3: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Silverlight Overview

User• Cross-browser, cross-platform• Media-rich (audio/video)• Run in-browser, out-of-browser• .xap - archive of assemblies,

manifest Programmer• .NET programming model• Networking and LINQ support

Page 4: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Silverlight architecture

• Presentation (e.g. Media)• CoreCLR (optimized)

Page 5: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Silverlight overview - security

• Run-time security modes o In browser, out of browser

• Sandboxo User initiated, same origin

policy

   

Page 6: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Scope

• In scopeo Vulnerabilities against Silverlight

related components • Out of scope

o Classical attacks (SQL Injection, XSS etc)

  • Due to XAP/CoreCLR, hackers can now

apply .NET assembly hacking techniques to your web application

Page 7: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Useful concepts

• XAP• CoreCLR• Intermediate Language (IL)

  • Widely Available Tools

o ILASM/ILDASMo Reflectoro ReflexIL

 • Signing/Tamper detection• Obfuscation (Protect IP)

Page 8: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Demos

Page 9: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Demo 1 Summary

Problems• Code not obfuscated• Tamper-able Assembly • Client side Business logic

Solutions• Use code obfuscation• Assembly Signing• Server Side Business

Page 10: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Demo 2 Summary

Starting conditions• Code was obfuscated• Tamper resistant• IP / Business logic on

server side 

Run-time hacking• Bypass tamper detection• Bypass server business

logic

Page 11: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Recommendations

• Web security - XSS, data encryption

• CLR - Obfuscation, signing• Domain-specific - e.g. banking

application• Legal

Page 12: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

Q&A

  

Page 13: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security

References• Silverlight Security Overview - MSDN• Silverlight Architecture - MSDN• SOS command reference - MSDN• CLR Inside Out - MSDN• http://www.windowsdebugging.com

[email protected]@windowsdebugging.com

Page 14: A Hacker's Perspective Kamran Bilgrami / Angelo Chan Silverlight Security