9.3 Detecting Internet Browser Attacks Detecting incoming malicious mobile code in the browser environment (without relying on an antivirus scanner) isn't for the technological faint of heart. It requires a minimum understanding of browser-based languages and technologies. 9.3.1 Use an Antivirus Scanner or FirewallIf you are using a well-designed and fully functional antivirus scanner/firewall product, it should detect some known security vulnerabilities. Unfortunately, browser exploits are frequent and varied, and it only takes one little change to bypass a scanner. Antivirus scanners do not have the greatest luck against browser-based malicious mobile code. Some software tools, such as Finjan's SurfinShield are built from the ground up to detect and prevent browser-based security threats, and as such, should be given higher consideration in an environment with a higher than normal risk of browser exploits. 9.3.2 Check Unexpected or Unexplained ErrorsMalicious mobile code often causes unexpected errors or warnings. If you are surfing a web site and all of a sudden an error message pops up saying something like, "Unable to access System Registry," there is a good chance malicious mobile code is afoot. I also get suspicious if my browser warns me that unsafe content is attempting to access local resources. That said, most browser errors are created by legitimate , poorly written scripts or buggy browser code. When in doubt, try the next step. 9.3.3 View Source Code On suspicious web pages, I often view the source code (View 9.3.4 Look for the FileSystemObject in Scripts Microsoft's Scripting Runtime Engine Example 9-5. VBScript using a FileSystemObject call to create a new subdirectory called C:\MaliciousSub CreateFolder Dim fsysobj, foldr Set fsysobj = CreateObject("Scripting.FileSystemObject") Set foldr = fsysobj.CreateFolder("C:\Malicious") End Sub Example 9-6. JScript using FileSystemObject call to read AUTOEXEC.BAT file.Sub ReadFile Var fsysobj, file1 fsysobj = new ActiveXObject("Scripting.FileSystemObject") file1=fsysobj.GetFile("C:\AUTOEXEC.BAT") End Sub When I'm looking at possibly malicious scripting code, I look for coding that interacts with the local file system. Finding instances of the FileSystemObject being used is a good sign of this type of interaction going on. 9.3.5 Look for Unexpected Newly Modified Files Using Windows File Find feature (Start ![]() |
![]() | |
Team-Fly ![]() |
Top |