<p/><br></br><p><b> Book Synopsis </b></p></br></br><b>Hackers exploit browser vulnerabilities to attack deep within networks</b> <p><i>The Browser Hacker's Handbook</i> gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.</p> <p>The web browser has become the most popular and widely used computer program in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. <i>The Browser Hacker's Handbook</i> thoroughly covers complex security issues and explores relevant topics such as: </p> <ul> <li>Bypassing the Same Origin Policy</li> <li>ARP spoofing, social engineering, and phishing to access browsers</li> <li>DNS tunneling, attacking web applications, and proxying--all from the browser</li> <li>Exploiting the browser and its ecosystem (plugins and extensions)</li> <li>Cross-origin attacks, including Inter-protocol Communication and Exploitation</li> </ul> <p><i>The Browser Hacker's Handbook</i> is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.</p><p/><br></br><p><b> From the Back Cover </b></p></br></br><p><b>Browsers have never been more vulnerable.</b><br /> <b>Are you prepared?</b></p> <p>The browser has essentially become the operating system of the modern era, and with that comes vulnerabilities on a scale not yet seen in IT security. <i>The Browser Hacker's Handbook, </i> written by an expert team of browser hackers, is the first book of its kind to offer a tutorial-based approach to understanding browser vulnerabilities and learning to defend your networks and critical systems from potential attacks.</p> <p>This comprehensive guide will show you exactly how hackers target browsers and exploit their weaknesses to establish a beachhead and launch attacks deep into your network. Fight back with <i>The Browser Hacker's Handbook.</i></p> <p><b>Learn to: </b></p> <ul> <li>Exploit the most common vulnerabilities of Firefox(R), Internet Explorer(R), and Chrome(TM), as well as other browsers</li> <li>Leverage browsers as pivot points into a target's network when performing security assessments</li> <li>Initiate--and maintain--control over a target browser, giving you direct access to sensitive assets</li> <li>Exploit weaknesses in browser plugins and extensions, two of the most vulnerable entry points for the browser</li> <li>Use Inter-protocol Communication and Exploitation to further exploit internal network systems from the hooked browser</li> </ul> <p>Visit the companion website at <b>browserhacker.com</b> to download all the code examples in this book.</p><p/><br></br><p><b> About the Author </b></p></br></br><p><b>WADE ALCORN</b> is the creator of the BeEF open source browser exploitation framework, among toolswatch.org's top 10 security tools.</p> <p><b>CHRISTIAN FRICHOT</b> is a lead developer of BeEF, as well as a leader of the Perth Open Web Application Security Project.</p> <p><b>MICHELE ORRÙ</b> is the lead core developer of BeEF, as well as a vulnerability researcher and social engineer.</p>
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us