Last Updated on 22/11/2021 by Nidhi Khandelwal
Image courtesy; Medium.com
The Gummy Browsers attack aims to collect a person’s fingerprint by tricking them into visiting a malicious website.
This attack approach can be used to get around 2FA on authentication systems.
After obtaining fingerprints via their malicious website, the attacker can use them to impersonate a person on a target machine.
Gummy Browsers may successfully imitate the victim’s browser virtually every time, according to the findings, without harming the tracking of legitimate users.
The second way is to change the browser attributes to any custom value impacting JavaScript API and the relevant value in the HTTP header using a browser setting and debugging tools.
The third way is to change browser properties with faked values by modifying scripts. It causes scripts on websites to be changed before they are delivered to the web server.
Researchers were able to fool advanced and current fingerprinting technologies for an extended period of time in an assault sample.