Overview
Syllabus
Introduction
What are ManintheBrowser attacks
History of JEN
Timba
Trojan Capabilities
Top 10 Trojan Variants
Financial Losses
Content Security Policy
HTTP Public Key Pinning
SSL Transport Security
Headers
Trojan
Starting point
Extensions are dangerous
Requirements
C2 Requirements
Web Requests API
Can you modify the response body
Debugging the browser
Changing the DOM
Architecture
Demos
Testing
Grabber
Dumb Taming
Strategy
Polymorphism
Our thoughts
Other solutions
Realtime monitoring
Final demo
Wrapping up
Conclusion
How easy is it
Traditional approach
Who can be tricked
Extension icons
Missing
Mozilla
CSP in Meta Tags
Taught by
OWASP Foundation