Электронная книга: Wade Alcorn «The Browser Hacker's Handbook»

The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer«program» in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying—all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

Издательство: "John Wiley&Sons Limited (USD)"

ISBN: 9781118662106

электронная книга

Купить за 3577.17 руб и скачать на Litres

Другие книги схожей тематики:

АвторКнигаОписаниеГодЦенаТип книги

См. также в других словарях:

  • Clickjacking — is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.[1][2][3][4] A vulnerability across a variety of browsers and platforms, a… …   Wikipedia

  • Tor (anonymity network) — Tor Developer(s) The Tor Project[1] Initial release 20 September 2002 (2002 09 20) …   Wikipedia

  • Jon Lech Johansen — Born November 18, 1983 (1983 11 18) (age 28) Harstad, Norway Known for DeCSS …   Wikipedia

  • Internet Relay Chat flood — Flooding or scrolling on an IRC network is a method of disconnecting users from an IRC server (a form of Denial of Service), exhausting bandwidth which causes network latency ( lag ), or just annoying users. Floods can either be done by scripts… …   Wikipedia

  • Geschichte der Zeitmessgeräte — Die Geschichte der Zeitmessgeräte lässt sich bis vor 6000 Jahren zurückverfolgen, als die Sumerer auf Tontafeln von Sonnenuhren berichteten. Von dieser Erfindung, die als eine der größten der Menschheit bezeichnet werden kann, existierte in einer …   Deutsch Wikipedia

  • billion laughs — n. An online attack that attempts to disable a website by sending a specially formatted sequence of characters such as lol and ha . Example Citations: This is called the Billion Laughs attack without going too far into the nuances of XML trickery …   New words

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»