The Browser Hacker's Handbook:
Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced c...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
2014
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781118662090/?ar |
Zusammenfassung: | Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy; ARP spoofing, social engineering, and phishing to access browsers; DNS tunneling, attacking web applications, and proxying--all from the browser; Exploiting the browser and its ecosystem (plugins and extensions); Cross-origin attacks, including Inter-protocol Communication and Exploitation. The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.-- |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxi, 626 Seiten) illustrations |
ISBN: | 9781118662106 1118662105 9781118914359 111891435X 9781306473446 1306473446 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047540400 | ||
003 | DE-627-1 | ||
005 | 20240228115512.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781118662106 |c electronic bk. |9 978-1-118-66210-6 | ||
020 | |a 1118662105 |c electronic bk. |9 1-118-66210-5 | ||
020 | |a 9781118914359 |c electronic bk. |9 978-1-118-91435-9 | ||
020 | |a 111891435X |c electronic bk. |9 1-118-91435-X | ||
020 | |a 9781306473446 |c MyiLibrary |9 978-1-306-47344-6 | ||
020 | |a 1306473446 |c MyiLibrary |9 1-306-47344-6 | ||
035 | |a (DE-627-1)047540400 | ||
035 | |a (DE-599)KEP047540400 | ||
035 | |a (ORHE)9781118662090 | ||
035 | |a (DE-627-1)047540400 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Alcorn, Wade |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The Browser Hacker's Handbook |c Wade Alcorn, Christian Frichot, Michele Orrù |
264 | 1 | |c 2014 | |
264 | 4 | |c ©2014 | |
300 | |a 1 Online-Ressource (xxi, 626 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy; ARP spoofing, social engineering, and phishing to access browsers; DNS tunneling, attacking web applications, and proxying--all from the browser; Exploiting the browser and its ecosystem (plugins and extensions); Cross-origin attacks, including Inter-protocol Communication and Exploitation. The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.-- | ||
546 | |a English. | ||
650 | 0 | |a Browsers (Computer programs) |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer networks |x Access control | |
650 | 4 | |a Navigateurs (Logiciels) ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; Networking | |
650 | 4 | |a COMPUTERS ; Security ; Online Safety & Privacy | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Handbooks and manuals | |
700 | 1 | |a Frichot, Christian |e MitwirkendeR |4 ctb | |
700 | 1 | |a Orrù, Michele |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781118662090 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781118662090 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118662090/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047540400 |
---|---|
_version_ | 1821494885503467520 |
adam_text | |
any_adam_object | |
author | Alcorn, Wade |
author2 | Frichot, Christian Orrù, Michele |
author2_role | ctb ctb |
author2_variant | c f cf m o mo |
author_facet | Alcorn, Wade Frichot, Christian Orrù, Michele |
author_role | aut |
author_sort | Alcorn, Wade |
author_variant | w a wa |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047540400 (DE-599)KEP047540400 (ORHE)9781118662090 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03990cam a22006372 4500</leader><controlfield tag="001">ZDB-30-ORH-047540400</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115512.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118662106</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-66210-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118662105</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-66210-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118914359</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-91435-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111891435X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-91435-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306473446</subfield><subfield code="c">MyiLibrary</subfield><subfield code="9">978-1-306-47344-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306473446</subfield><subfield code="c">MyiLibrary</subfield><subfield code="9">1-306-47344-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047540400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047540400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118662090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047540400</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alcorn, Wade</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Browser Hacker's Handbook</subfield><subfield code="c">Wade Alcorn, Christian Frichot, Michele Orrù</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 626 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy; ARP spoofing, social engineering, and phishing to access browsers; DNS tunneling, attacking web applications, and proxying--all from the browser; Exploiting the browser and its ecosystem (plugins and extensions); Cross-origin attacks, including Inter-protocol Communication and Exploitation. The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.--</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Browsers (Computer programs)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Navigateurs (Logiciels) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frichot, Christian</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Orrù, Michele</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781118662090</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781118662090</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118662090/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047540400 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:29Z |
institution | BVB |
isbn | 9781118662106 1118662105 9781118914359 111891435X 9781306473446 1306473446 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxi, 626 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
record_format | marc |
spelling | Alcorn, Wade VerfasserIn aut The Browser Hacker's Handbook Wade Alcorn, Christian Frichot, Michele Orrù 2014 ©2014 1 Online-Ressource (xxi, 626 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy; ARP spoofing, social engineering, and phishing to access browsers; DNS tunneling, attacking web applications, and proxying--all from the browser; Exploiting the browser and its ecosystem (plugins and extensions); Cross-origin attacks, including Inter-protocol Communication and Exploitation. The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.-- English. Browsers (Computer programs) Security measures Computer networks Security measures Computer networks Access control Navigateurs (Logiciels) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Security ; General Computer networks ; Access control Computer networks ; Security measures Handbooks and manuals Frichot, Christian MitwirkendeR ctb Orrù, Michele MitwirkendeR ctb 9781118662090 Erscheint auch als Druck-Ausgabe 9781118662090 |
spellingShingle | Alcorn, Wade The Browser Hacker's Handbook Browsers (Computer programs) Security measures Computer networks Security measures Computer networks Access control Navigateurs (Logiciels) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Security ; General Computer networks ; Access control Computer networks ; Security measures Handbooks and manuals |
title | The Browser Hacker's Handbook |
title_auth | The Browser Hacker's Handbook |
title_exact_search | The Browser Hacker's Handbook |
title_full | The Browser Hacker's Handbook Wade Alcorn, Christian Frichot, Michele Orrù |
title_fullStr | The Browser Hacker's Handbook Wade Alcorn, Christian Frichot, Michele Orrù |
title_full_unstemmed | The Browser Hacker's Handbook Wade Alcorn, Christian Frichot, Michele Orrù |
title_short | The Browser Hacker's Handbook |
title_sort | browser hacker s handbook |
topic | Browsers (Computer programs) Security measures Computer networks Security measures Computer networks Access control Navigateurs (Logiciels) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Security ; General Computer networks ; Access control Computer networks ; Security measures Handbooks and manuals |
topic_facet | Browsers (Computer programs) Security measures Computer networks Security measures Computer networks Access control Navigateurs (Logiciels) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Security ; General Computer networks ; Access control Computer networks ; Security measures Handbooks and manuals |
work_keys_str_mv | AT alcornwade thebrowserhackershandbook AT frichotchristian thebrowserhackershandbook AT orrumichele thebrowserhackershandbook AT alcornwade browserhackershandbook AT frichotchristian browserhackershandbook AT orrumichele browserhackershandbook |