SlideShare a Scribd company logo
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation

More Related Content

Viewers also liked (18)

PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
 
PDF
27 jan 2012[1]
Biblioteca Escolar Aeob
 
PPTX
Managing Security in External Software Dependencies
thariyarox
 
PPTX
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
 
PDF
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01
Cyber Security Alliance
 
PPTX
Continuous Security - TCCC
Wendy Istvanick
 
PPTX
Dependency check
David Karlsen
 
PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Imperva
 
PPTX
Live 2014 Survey Results: Open Source Development and Application Security Su...
Sonatype
 
PDF
Managing third party libraries
n|u - The Open Security Community
 
PPTX
News Bytes - December 2015
n|u - The Open Security Community
 
PDF
[Poland] SecOps live cooking with OWASP appsec tools
OWASP EEE
 
PDF
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
Stephan Kaps
 
PDF
Continuous Integration with Maven for Android apps
Hugo Josefson
 
PPTX
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
PDF
Les principales failles de sécurité des applications web actuelles
Bee_Ware
 
PDF
Owasp Project を使ってみた
Akitsugu Ito
 
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
 
27 jan 2012[1]
Biblioteca Escolar Aeob
 
Managing Security in External Software Dependencies
thariyarox
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
 
2014 11-06-sonarqube-asfws-141110031042-conversion-gate01
Cyber Security Alliance
 
Continuous Security - TCCC
Wendy Istvanick
 
Dependency check
David Karlsen
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Imperva
 
Live 2014 Survey Results: Open Source Development and Application Security Su...
Sonatype
 
Managing third party libraries
n|u - The Open Security Community
 
News Bytes - December 2015
n|u - The Open Security Community
 
[Poland] SecOps live cooking with OWASP appsec tools
OWASP EEE
 
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
Stephan Kaps
 
Continuous Integration with Maven for Android apps
Hugo Josefson
 
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
Les principales failles de sécurité des applications web actuelles
Bee_Ware
 
Owasp Project を使ってみた
Akitsugu Ito
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 

More from Ajin Abraham (15)

PDF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
PDF
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham
 
PDF
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
 
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
 
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
PPTX
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham
 
PPTX
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Ajin Abraham
 
PPTX
Exploit Research and Development Megaprimer: Win32 Egghunter
Ajin Abraham
 
PPTX
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Ajin Abraham
 
PPTX
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Ajin Abraham
 
PPTX
Exploit Research and Development Megaprimer: Buffer overflow for beginners
Ajin Abraham
 
PPTX
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Ajin Abraham
 
PDF
Wi-Fi Security with Wi-Fi P+
Ajin Abraham
 
PPTX
Phishing With Data URI
Ajin Abraham
 
PPTX
Buffer overflow for Beginners
Ajin Abraham
 
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham
 
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham
 
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Ajin Abraham
 
Exploit Research and Development Megaprimer: Win32 Egghunter
Ajin Abraham
 
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Ajin Abraham
 
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Ajin Abraham
 
Exploit Research and Development Megaprimer: Buffer overflow for beginners
Ajin Abraham
 
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Ajin Abraham
 
Wi-Fi Security with Wi-Fi P+
Ajin Abraham
 
Phishing With Data URI
Ajin Abraham
 
Buffer overflow for Beginners
Ajin Abraham
 
Ad

Recently uploaded (20)

PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Ad