<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Los_Angeles%2F2008_Meetings%2FNovember_19</id>
		<title>Los Angeles/2008 Meetings/November 19 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Los_Angeles%2F2008_Meetings%2FNovember_19"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2008_Meetings/November_19&amp;action=history"/>
		<updated>2026-04-26T14:51:51Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2008_Meetings/November_19&amp;diff=111316&amp;oldid=prev</id>
		<title>Sarah Baso: Created page with &quot;== Topic: A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation] ==    == Speaker: Stephan Chenett...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2008_Meetings/November_19&amp;diff=111316&amp;oldid=prev"/>
				<updated>2011-05-31T19:56:15Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Topic: A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation] ==    == Speaker: Stephan Chenett...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Topic: A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation] ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Speaker: Stephan Chenette ==&lt;br /&gt;
Stephan Chenette is a Senior Security Researcher who helps lead Websense Security&lt;br /&gt;
Labs working on malcode detection techniques. Mr. Chenette specializes&lt;br /&gt;
in research tools ranging from kernel-land sandboxes, to static&lt;br /&gt;
analysis scanners. He has released public analyses on various&lt;br /&gt;
vulnerabilities and malware. Prior to joining Websense, Stephan was a&lt;br /&gt;
security software engineer for 4 years working in research and product&lt;br /&gt;
development at eEye Digital Security.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Abstract: A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation] ==&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce a new web-based attack vector which&lt;br /&gt;
utilizes client-side scripting to fragment malicious web content.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This involves distributing web exploits in a asynchronous manner to&lt;br /&gt;
evade signature detection. Similar to TCP fragmentation attacks, which&lt;br /&gt;
are still an issue in current IDS/IPS products, This attack vector&lt;br /&gt;
involves sending any web exploit in fragments and uses the already&lt;br /&gt;
existing components within the web browser to reassemble and execute&lt;br /&gt;
the exploit.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our presentation will discuss this attack vector used to evade both&lt;br /&gt;
gateway and client side detection. We will show several proof of&lt;br /&gt;
concepts containing common readily available web exploits.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sarah Baso</name></author>	</entry>

	</feed>