Blitzableiter 1.0 - New Tool to Shiled Against Flash Attacks

Status
Not open for further replies.

savit

Level 1
Thread author
Apr 9, 2011
120
Blitzableiter - New Tool to Shiled Against Flash Attacks !

Blitzableiter codenamed as Lightning Rod, it the mitigation technology filters malicious Flash (.SWF) files before they can carry out an attack against a vulnerability in the Adobe Flash Player.

First version has been officially launched at FIRST conference in Vienna (June 12-17, 2011). The beta version has already been used by several companies, including a large social networking site in Europe.

The general idea behind Blitzableiter is a method called normalization through recreation. The potentially malicious input file is read, parsed and interpreted as completely as possible, applying very strict rules of specification compliance in the process. If the input file is violating those rules, it is rejected as invalid. After the initial parsing, the original input file is discarded completely and a new file is created, based on the information obtained from the original input file.

Blitzableiter itself is entirely managed code for the .NET runtime environment. This prevents malicious Flash files from targeting the Blitzableiter parser instead of the Flash runtime parser for exploitation of memory corruptions, as .NET provides superior protection against those.

For more interesting technical details and to download, visit Blitzableiter project page
(securityxploded forum)

4l3bwj.jpg


'Browse...' Click -> 'bb.exe' file choice

Blitzableiter Project Home

Download

[Presentation] DEFCON 18: Blitzableiter: the Release

[Presentation] Black Hat USA 2010: Blitzableiter: The Release
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top