Fireshark plugin decodes the malicious Web

The tool for Firefox expediates investigation of Web sites that may have malicious code

A computer security researcher has released a plugin for Firefox that provides a wealth of data on Web sites that may have been compromised with malicious code.

The plugin, called Fireshark, was released on Wednesday at the Black Hat conference. The open-source free tool is designed to address the shortcomings in other programs used to analyze malicious Web sites, said Stephan Chenette, a principal security researcher at Websense, which lets Chenette develop Fireshark in the course of his job.

Hackers often target legitimate Web sites with code that can either infect a machine with malicious software or redirect a user to a bad Web page.

Websense specializes in detecting Web pages that have been infected, as many site administrators don't know that their sites are harmful to visitors or have difficulty reverse-engineering malicious code. Fireshark will "show you the exact details of a mass compromise," Chenette said.

Over the last 12 months, the number of newly compromised Web sites has increased about 225 percent, Chenette said.

"That means attackers are controlling more content that ever before that is being fed to users."

Fireshark must be run in a virtual machine in order to prevent an infection. Users can input a list of Web sites for investigation. Fireshark then exposes the Web sites' code.

That harmful code is often obfuscated, so it is difficult to tell what it actually does, Chenette said. But the obfuscated code has to run in the browser in order to work. Fireshark exposes the code, which normally can't be viewed, when it runs in the browser's memory.

"I became frustrated at the publicly available tools," Chenette said. "I heard the outcry from the community that there are not the correct tools to reverse the obfuscated content."

Once the code has been exposed, it's then possible to do more investigation and see if other Web sites are affected, Chenette said. Fireshark will show vulnerabilties and exploits on Web sites.

Many Web sites will be infected with code that either delivers malware or redirects users to bad Web sites. The tools also generate maps of those redirections, which can give clues as to who may be behind the attacks.

Fireshark collects the data in a ".yml" file, which is similar to an XML file, Chenette said. The ".yml" file can then be integrated into other security analysis tools, Chenette said. The data that Fireshark collects is all held locally, and none of it is shared with Websense.

Fireshark is available to download.

Join the PC World newsletter!

Error: Please check your email address.

Tags FiresharkFirefoxopen sourceblack hatsecuritywebsensemalware

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?