The Browser Hacker's Handbook
Ratings/reviews counts are updated frequently.
Check link for latest rating. ( 76 ratings, 4 reviews)Read More
Found a better price? Request a price match
The Browser Hacker's Handbook
Book Hero Magic created this recommendation. While it's new and still learning, it may not be perfect - your feedback is welcome! IS THIS YOUR NEXT READ?
The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
The Browser Hacker's Handbook provides a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook offers hands-on tutorials exploring a range of current attack methods.
The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it serves as part of the storefront for any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as:
- Bypassing the Same Origin Policy
- ARP spoofing, social engineering, and phishing to access browsers
- DNS tunneling, attacking web applications, and proxyingβall from the browser
- Exploiting the browser and its ecosystem (plugins and extensions)
- Cross-origin attacks, including Inter-protocol Communication and Exploitation
The Browser Hacker's Handbook is written with professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component of any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.
Book Details
INFORMATION
ISBN: 9781118662090
Publisher: John Wiley & Sons Inc
Format: Paperback / softback
Date Published: 08 April 2014
Country: United States
Imprint: John Wiley & Sons Inc
Audience: Professional and scholarly
DIMENSIONS
Spine width: 36.0mm
Width: 185.0mm
Height: 234.0mm
Weight: 1111g
Pages: 656
About the Author
WADE ALCORN is the creator of the BeEF open source browser exploitation framework, among toolswatch.orgs top 10 security tools. CHRISTIAN FRICHOT is a lead developer of BeEF, as well as a leader of the Perth Open Web Application Security Project. MICHELE ORR is the lead core developer of BeEF, as well as a vulnerability researcher and social engineer.
More from Computing & Technology
View allWhy buy from us?
Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!
Service & Delivery
Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.
Auckland Bookstore
We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.
Our Gifting Service
Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.
