4.9 • 696 Ratings
🗓️ 12 June 2020
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, June 12th, 2020 edition of the Sandinut Storm Center's Stormcast. |
0:08.5 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:14.4 | Xavier today is talking about some of the trap doors that attackers leave behind in JavaScript code in order to make |
0:24.2 | reverse analysis more difficult. |
0:27.7 | Of course, we have talked about malware analysis reversing JavaScript quite a few times. |
0:34.2 | So a couple things that Xavier points out here is first of all, the arguments. |
0:39.9 | Dot collie dot two string method that's often used. Essentially what this does is it allows |
0:47.7 | a function to return its source code as a string. And then the attacker could check if that function was |
0:56.8 | modified by, for example, calculating a hash. Analysts often like to, for example, insert statements |
1:04.1 | to pull out certain strings that are being reassembled as part of the obfuscation process, |
1:13.4 | and modifications like this will then of course be detected. Now of course there's other ways to do this. Most modern |
1:20.8 | browsers do have developer tools and with developer tools you can set breakpoints in your JavaScript, and then you can just |
1:30.9 | watch these variables as they change, and you don't need to actually change the source code. |
1:37.9 | Well, Xavier shows how this also can get detected. Essentially, what the attacker is looking for here, |
1:46.0 | is there a console available, |
1:47.9 | which is typically enabled if you do run the code inside one of these browser-built-in |
1:55.2 | debuggers, and that's sort of how the attacker is then trying to get around this particular feature in the |
2:03.3 | browser. |
2:04.4 | And Savi actually links to some older articles by Mozilla here that go over some of these |
2:12.1 | functions. |
2:12.6 | And yes, this isn't new necessarily, but something important to keep in mind if you are analyzing JavaScript. |
2:23.4 | And recent security company that makes entire matter found sort of a neat little bug in the Windows native Facebook Messenger application. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.