Click here to Skip to main content
15,887,135 members
Please Sign up or sign in to vote.
0.00/5 (No votes)
See more:
According to this article, i'm looking for an idea to protect browser from this attack, it's called en.wikipedia.org/wiki/Form_grabbing , the malware hook the API call of the browser when he send the request and before its encrypted with(HTTPS/SSL)..
I don't know if just sandboxing the browser api call, can be a solution for this?

Thanks in advance.
Posted
Updated 24-Feb-13 10:06am
v2
Comments
Sergey Alexandrovich Kryukov 24-Feb-13 13:36pm    
Your link is invalid to a non-existing page.
—SA
marwen109 24-Feb-13 16:07pm    
Link corrected, Thank you.

1 solution

The sandboxing is not a solution. You can consider a sandbox as a separate system isolated from your host system. If something bad happens to the sandbox, it won't infect the host system or damage it otherwise. In other words, a sandbox is a method to try something risky or questionable without the associated risk. But it you want to do everything in a sandbox, it would defeat its purpose.

For your purpose, this is not enough. If your password is eavesdropped, you don't care where it happens, in a sandbox or not. The only remedy is starting to work from a healthy system and using safety practices ever since. (And yes, sandboxing is one of them, a good one, but only in the sense I described above.) You cannot do much about this, unless you are developing some universal anti-malware tool. But in this field, there are no general recipes. And none of these tools gives you 100% guarantee.

—SA
 
Share this answer
 
Comments
marwen109 25-Feb-13 14:43pm    
Thanks Alex, very interesting.., also i have found this article that gives some idea: http://www.szabist.edu.pk/Publications/ZSession%20II%20Paper%20No%205%20(P%20189-191).pdf
Sergey Alexandrovich Kryukov 25-Feb-13 14:46pm    
Alex is someone else, not me...
Anyway, will you accept this answer formally (green button)? I doubt you will get a lot more than that...
—SA
Sergey Alexandrovich Kryukov 25-Feb-13 14:49pm    
This article is about key loggers, which are different from form data logging. Key loggers work on different technical principles. Some basic approaches to protection should be somewhat similar though...
—SA

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)



CodeProject, 20 Bay Street, 11th Floor Toronto, Ontario, Canada M5J 2N8 +1 (416) 849-8900