Showing posts with label Google. Show all posts
Showing posts with label Google. Show all posts

Saturday, April 16, 2011

Why Use Google Chrome


I had always been a fan of Google, right from the day one I came to experience the power of Google search, I started using their Search engine and with the introduction of GMail, I was living my dream of having the best ever mail application nd that too for free of cost, with tons of features like Gigabytes of space, Keyboard Shortcuts, Mail Filtering, Tagging\Grouping and lots more. 

With Google stepping into the browser market I was bit doubtful on how it’s going to compete with the deep rooted giants like Microsoft IE, Mozilla FireFox et al. But once I installed this application I was taken by storm after experiencing its performance and robustness in terms of security and ease of use, though at first there were some hiccups which were straightened out in the later releases. So coming back to the title of this article "Why Use Google Chrome", I would like to share what the experts\hackers community had to say about Google Chrome.

Secure Browser ever built: At first glance it might look like a marketing tag line. We’ll see how Google Chrome befits for this secure ranking status. Google had announced a cash prize of $20,000 for coming out a with chrome exploit, but as on date no one had ever succeeded in bagging this prize money.  In the last two PWN2OWN contest at the CanSecWest conference, where security experts around the world compete to exploit the browser vulnerabilities of those including Chrome, Firefox, Safari, Opera and Internet Explorer. The only browser which came out unscathed was Google Chrome because of its sand-boxing model. Lets  hear what Charlie Miller(a security expert) had to say "There are bugs in Chrome but they're very hard to exploit. I have a Chrome vulnerability right now but I don't know how to exploit it. It's really hard. They've got that sandbox model that's hard to get out of. With Chrome, it's a combination of things - you can't execute on the heap, the OS protections in Windows and the Sandbox."  While browsers from Apple, Microsoft browsers drop to first shots at the hacking contest. In fact, Safari was apparently exploited in a matter of seconds. While the most impressive hack was that of  Fewer's, who used three vulnerabilities to [not only] bypass ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention), but also escape Internet Explorer's Protected Mode, which was something not seen at PWN2OWN before. Click here to read more on this vulnerability.

So What's Sandboxing: If the term sandboxing is new to you, no need to worry as this is a simple principle used in computer science to insulate un-trusted\untested code from a developer or company from accessing or altering the core system components or configurations. The sandbox typically provides a tightly-controlled set of resources for programs to run in, such as scratch space on disk and memory.  In simple terms its assigning the least privilege or just the required privilege to every process involved in executing a task without affecting the stability or integrity of the host system. 

How Chrome Sandboxing Works: Chrome implements Sandboxing by utilizing windows security model called process tokens. If you were to open up a chrome window you will find two chrome.exe listed under the Task Manager process tab even if you are browsing a single site (You will find more chrome.exe processes, if you have installed any browser plug-ins). You could also notice all processes running under the same username which you had logged in, so you might be thinking how does this policy of least privilege apply here and why these many processes? 

Traditionally browsers contain all the sites you browse into a single process; this means all web sites share the same address space. In such a scenario, if you were to visit a hijacked site installed with malware, it might exploit\access all sites opened in other tabs and using buffer overflow exploits it could even access your system resources including files on your disk and more. Also if any one of the tab crashes the entire browser will hang or come down crashing causing you to lose any unsaved data with it, this might not be something new for anyone who had been using browsers like IE and Firefox. 

So let’s explore how the chrome security model works. For this you need Process Explorer to see how the sandboxing (process tokens are assigned) works. Open up chrome and browse www.google.com Next start ProcessExplorer.exe, here you will find two chrome.exe process listed (you will find more chrome.exe processes, if you had installed any plug-ins). The chrome.exe process are laid out in a hierarchical way, where a parent chrome.exe process is listed with a child chrome.exe process as shown below.




Here what you see is chromes sandboxing model in action, which relies on protection provided by windows. The Sandbox operates at process-level granularity. Anything that needs to be sandboxed needs to live on a separate process. The minimal sandbox configuration has two processes: one that is a privileged controller known as the broker process, and the sandboxed processes known as the target process. In Chrome the broker process is called the Browser Process, while the target process is called as the Renderer process. In the above screen shot, the Browser process is the parent Chrome.exe process, while the child Chrome.exe is the target process, i.e. the Sandboxed process. The Renderer process (i.e. the target process) communicates with the Browser process (i.e. the broker process) using chrome IPC channels. The sandbox IPC channel is a low-level mechanism (different from Chromium's IPC) which is used to transparently pass on certain windows API calls from the target (Renderer process) to the broker (Browser process).

Now let’s explore the security tokens assigned to the Renderer Process, for this select the properties of the child chrome.exe and select Security tab. Here you would see all the users and groups with deny restrictions and a NULL SID which denotes a group with no members. This effectively takes out permission from the renderer process from accessing resources on your system.
         
When you key-in a URL to the chrome window, its passes on the request to Browser process through IPC channel. The Browser process then makes a request to the specified web address\url and all the data received from the webserver is passed back to the Renderer process which does the rendering of the webpage using web kit engine.

If you are interested to know more on chrome internals, here is a couple of links worth visiting.

So to conclude, sandboxing being one of the pioneer security model used by chrome to combat possible exploits. Chrome uses another feature called "Phishing Filter" to prevent users from visiting phishing sites by checking against a list of known phishing site list and warns the user about potential risk of visiting the site. The other plug-in worth installing is the "NotScript" extension that provides high degree of security by disabling scripting for non-white listed sites. If you trust a site you can white list that site, only then it will allow scripts to be executed at the browser end.


So having said this, I believe no browser as of now is as much as robust as Chrome on taking security this seriously, though IE had come up with its protected mode, but it still has a long way to go in order to catch up with chromes prowess in terms of security, performance and responsiveness.


So have a safe browsing with Google Chrome.

Thursday, April 15, 2010

Google - Exploring the Hidden Jewels

Google the company that revolutionized the way people interact with internet, beginning all the way from search engine to its present offering the "Google OS". Its services had mostly been accepted with open arms by the internet community at large. 


As a Google user, i admire the way they innovate, transform ideas into successful solutions. I was keen to know what Google had under its sleeve other than the usual search we see. I was really taken away by the prowess they contained; If you had ever thought that Google is only meant to search the vast universe of internet data, then you might be blown away on what we are about to explore.


Google Calculator
The very simple input area on the Google search engine transforms itself to a scientific calculator, when you key in those mathematical equations and expressions. If you want to explore the Google Calc features to its brim, take a look here for a complete reference. I will list out some excerpts from the link






Google Expressions
I am listing out some expressions, which you can try out yourself
(Note: expressions are highlighted in bold. You can straight away enter those expressions to the Google search box.)




Percentage Expressions
12.3% of 344 - Gets 12.3 percentage of 344


Base Conversions
12 in binary - Gets the binary equivalent of 12
12 in octal - Gets the oct representation for 12
12 in hex - Gets the hex representation for 12
0b10 in decimal - Gets the decimal equivalent for the binary input of "0b10", for binary you must prefix "0b" (without quotes)
0o25 in decimal - Gets the decimal equivalent for the octal, for octal prefix "0o".
0x80 in decimal - Get decimal equivalent for hex, for hex prefix "0x".
20 degrees in radians - Converts degrees to radians.
10  radians in degrees - Converts radians to degrees.


Constants
3 pi - will output 3 * value of PI.


Simple Expressions
how many seconds in 1 hour
how many seconds in 5 weeks
how many seconds in 10 years
how many seconds in 10 centuries


how many days in a week
how many days in a year
how many days in a month
how many days in a century


speed of light
speed of sound




Volume\Date-Time Conversions
1 decade = ?year
1 millenium= ?year


1 km = ?meter
1 meter = ?km
1 furlong = ? meter
1 furlong = ? km



1 picometer = ?mm





1 yard = ? meter




1 mile = ?km


1 cm= ?km
1 cm= ?miles
1 cm = ?mm
1 nanometer = ?mm
1 feet = ?cm
1 decimeter = ? mm


1 volt = ? millivolts
1 joule  = ? watt hour
1 joule  = ? kilowatt hour
1 kilowatt hour = ? joule


1 ton = ? kg
1 ton = ? gram
1 kg = ? gram
1 pound  = ?kg
1 teaspoon = ? ml
1 cup = ? ml
1 gram  = ? kg
1 milligram  = ? gram
1 milligram  = ? kg
1 ounce  = ? kg
1 kg = ?lbs - reads 1 Kg is how many pounds
1 pound  = ? oz - reads to 1 pound is how many ounces








1 liter =?ml - 1 liter is how many milliliter
1 gallon  = ? liter
1 microliter  = ? liter
1 grain  = ? kg
1 cubic centimeter= ?ml
1 cubic centimeter= ?liter
1 cubic feet= ?liter
1 quart  = ?liter
1inch  = ?cm

1hz = ?khz


Currency Conversions
1 dollar = ? cent
1 USD = ? INR - Converts US Dollars to Indian Rupees
1 Euros in USD
1 USD in Euros


Google Language Translation - Expressions


en:fr Hello - Translates English to French
en:es Hello - Translates English to Spanish
en:it Hello - Translates English to Italian
en:de Hello - Translates English to German
en:zh Hello - Translates English to Chinese
en:ja Hello - Translates English to Japanese
en:ko Hello - Translates English to Korean
en:ru Hello - Translates English to Russian
en:en Avionics - Shows the pronunciation as well as the meaning of the word.




Misc Commands
define: Avionics - Shows up a list of definitions from different dictionaries and over from the web.


site:msdn.microsoft.com hooks - This will search only the msdn site for the term "hooks"


filetype:pdf C programming - This returns all PDF with the term "C Programming". You can replace the pdf with txt, doc, ppt, xls etc.




I will be updating this section with more new expressions and equations, so watch out for this space.