security - What damage can a website do? -


now , (accidentally) come across websites anti-virus warns me about. out of curiosity, kind of damage can website do?

i've been working in web development around 4 years , can't think of 'genuine' damage worth warning user about. maybe i'm missing obvious, surely browsers , basic security measures implemented main operating systems prevent particularly invasive going on?

i'm talking threats aside deceptive way (phishing etc.). taxing browser enough warrant anti-virus warning (i.e. overload page resource-draining javascript)? typically, cookies, caches , localstorage have limits - can't think of go on there.

i suspect may off-topic, it's less technically specific i'd ask. i'll happily delete if case.

the main risk encountering drive-by download.

a drive-by download isn't file download in usual sense, browser exploit allows executable code download , execute on system (known payload).

one example microsoft internet explorer colspan element processing arbitrary code execution vulnerability:

microsoft internet explorer contains vulnerability allow unauthenticated, remote attacker execute arbitrary code on targeted system.

the vulnerability due improper processing of elements in web pages. unauthenticated, remote attacker exploit vulnerability convincing user view malicious website. if successful, attacker exploit vulnerability execute arbitrary code on system privileges of user.

the vulnerability due improper handling of changed colspan in fixed table layout. if colspan increased after initialization, trigger heap-based buffer overflow.

however, more recent exploits exist such this 1 year (2015) in flash player:

adobe flash player before 13.0.0.269 , 14.x through 16.x before 16.0.0.305 on windows , os x , before 11.2.202.442 on linux allows attackers execute arbitrary code or cause denial of service (memory corruption) via unspecified vectors

another attack vector website exploitation of cross domain attack such cross site request forgery. such malicious site making background requests other sites you're logged into. example, might making ajax requests https://facebook.com/delete_account (made url path), , you're logged facebook browser pass cookies , action triggered. is, if facebook did not have csrf protection delete account function (i'm pretty sure though).

another example of cross domain attack site may trying exploit xss flaw on site use. redirect site , capture credentials log in, or more sneaky request site in background , grab session cookie. requires target site contain such xss flaw however.


Comments

Popular posts from this blog

PHP DOM loadHTML() method unusual warning -

python - How to create jsonb index using GIN on SQLAlchemy? -

c# - TransactionScope not rolling back although no complete() is called -