Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Browser Hacker's Handbook

Buy

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.

The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as:

  • Bypassing the Same Origin Policy
  • ARP spoofing, social engineering, and phishing to access browsers
  • DNS tunneling, attacking web applications, and proxying—all from the browser
  • Exploiting the browser and its ecosystem (plugins and extensions)
  • Cross-origin attacks, including Inter-protocol Communication and Exploitation

The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

(HTML tags aren't allowed.)

TruCluster Server Handbook (HP Technologies)
TruCluster Server Handbook (HP Technologies)

The TruCluster Server Handbook authoritatively details how to plan, design, install, configure, and administer a cluster of Tru64 UNIX systems. The book explains how to configure and optimize hardware underlying a TruCluster server, including a TruCluster server, including storage servers so critical to running a high-end cluster...

Call Center Operation: Design, Operation and Maintenance
Call Center Operation: Design, Operation and Maintenance

Every customer-facing corporation has at least one call center. In the United States, call centers handle a billion calls per year. Call Center Operation gives you the complete coverage of the critical issues involved in the design, implementation, organization, and management of a customer call center. Sharp provides information on...

The SAIC Solution: How We Built an $8 Billion Employee-Owned Technology Company
The SAIC Solution: How We Built an $8 Billion Employee-Owned Technology Company
For more than three decades, Science Applications International Corporation (SAIC)—the largest employee-owned research and technology company in the United States—has achieved unparalleled success in the areas of science, engineering, and technology, all while flying well below the radar of most casual business observers.

As the...


Socialism?The Tragedy of an Idea: Possible? Inevitable? Desirable?
Socialism?The Tragedy of an Idea: Possible? Inevitable? Desirable?
This book explores the idea of socialism from three angles and raises the questions if socialism is possible, inevitable, and desirable. Socialism as an economic and societal system was possible based on the two most important pillars of Marxian political economy: State ownership in the means of production and mandatory central planning...
Human Reliability Assessment Theory and Practice
Human Reliability Assessment Theory and Practice

A continually evolving discipline, Human Reliability Assessment (HRA) has elements of controversy from the definition of terms to the application of appropriate methods for the representation of human failure probability. The idea that human error is a random event is falling out of favor and the concept that humans can be set up to fail or...

Learning Structure and Schemas from Documents (Studies in Computational Intelligence)
Learning Structure and Schemas from Documents (Studies in Computational Intelligence)
It was not long ago that database systems were revolutionized through the birth of the relational concepts and theory, which are now materialized in most commercial database management systems. It was then thought that data should be structured in a rather simple way to support the day-to-day business operations. This has...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy