The Browser Hacker's Handbook /
Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced c...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley,
©2014.
©2014 |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn871225516 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140301s2014 inua ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d IDEBK |d MHW |d OCLCQ |d N$T |d OCLCO |d TEF |d E7B |d TEFOD |d DEBSZ |d OCLCO |d CDX |d DOS |d COO |d YDXCP |d UMI |d DEBBG |d B24X7 |d OCLCQ |d K6U |d RECBK |d TEFOD |d OCLCQ |d OCLCO |d CNNOR |d MOR |d PIFAG |d ZCU |d LIV |d MERUC |d OCLCQ |d YT1 |d OCLCQ |d U3W |d BUF |d STF |d OCLCF |d CEF |d NRAMU |d ICG |d VTS |d OCLCQ |d NTG |d INT |d VT2 |d AU@ |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d DKC |d OCLCQ |d UKAHL |d OCLCQ |d VLY |d BRF |d CZL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
016 | 7 | |a 016608794 |2 Uk | |
019 | |a 883141254 |a 884810327 |a 961654795 |a 962636976 |a 966385632 |a 1055368257 |a 1065696516 |a 1081208303 |a 1103266448 |a 1129356206 |a 1153014062 |a 1162082284 |a 1192345702 |a 1295595362 |a 1300647269 |a 1303374342 | ||
020 | |a 9781118662106 |q (electronic bk.) | ||
020 | |a 1118662105 |q (electronic bk.) | ||
020 | |a 9781118914359 |q (electronic bk.) | ||
020 | |a 111891435X |q (electronic bk.) | ||
020 | |a 9781306473446 |q (MyiLibrary) | ||
020 | |a 1306473446 |q (MyiLibrary) | ||
020 | |a 9781118662090 |q (pbk.) | ||
020 | |a 1118662091 |q (pbk.) | ||
029 | 1 | |a AU@ |b 000058029760 | |
029 | 1 | |a AU@ |b 000062533357 | |
029 | 1 | |a DEBBG |b BV042031145 | |
029 | 1 | |a DEBBG |b BV043607985 | |
029 | 1 | |a DEBSZ |b 405664737 | |
029 | 1 | |a DEBSZ |b 414187342 | |
029 | 1 | |a NZ1 |b 15590834 | |
035 | |a (OCoLC)871225516 |z (OCoLC)883141254 |z (OCoLC)884810327 |z (OCoLC)961654795 |z (OCoLC)962636976 |z (OCoLC)966385632 |z (OCoLC)1055368257 |z (OCoLC)1065696516 |z (OCoLC)1081208303 |z (OCoLC)1103266448 |z (OCoLC)1129356206 |z (OCoLC)1153014062 |z (OCoLC)1162082284 |z (OCoLC)1192345702 |z (OCoLC)1295595362 |z (OCoLC)1300647269 |z (OCoLC)1303374342 | ||
037 | |a 51968B98-C2E3-457B-8AC5-603D813916D8 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 .A384 2014 | |
050 | 4 | |a TK5105.59 |b .A393 2014 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Alcorn, Wade. | |
245 | 1 | 4 | |a The Browser Hacker's Handbook / |c Wade Alcorn, Christian Frichot, Michele Orrù. |
260 | |a Indianapolis, IN : |b Wiley, |c ©2014. | ||
264 | 4 | |c ©2014 | |
300 | |a 1 online resource (xxi, 626 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
505 | 0 | |a Web Browser Security -- Initiating Control -- Retaining Control -- Bypassing the Same Origin Policy -- Attacking Users -- Attacking Browsers -- Attacking Extensions -- Attacking Plugins -- Attacking Web Applications -- Attacking Networks -- Epilogue: Final Thoughts. | |
505 | 0 | |a Copyright; About the Authors; About the Contributing Authors; About the Technical Editor; Credits; Acknowledgments; Contents; Introduction; Chapter 1: Web Browser Security; A Principal Principle; Exploring the Browser; Symbiosis with the Web Application; Same Origin Policy; HTTP Headers; Markup Languages; HTML; XML; Cascading Style Sheets; Scripting; JavaScript; VBScript; Document Object Model; Rendering Engines; WebKit; Trident; Gecko; Presto; Blink; Geolocation; Web Storage; Cross-origin Resource Sharing; HTML5; WebSocket; Web Workers; History Manipulation; WebRTC; Vulnerabilities. | |
505 | 8 | |a Evolutionary Pressures HTTP Headers; Content Security Policy; Secure Cookie Flag; HttpOnly Cookie Flag; X-Content-Type-Options; Strict-Transport-Security; X-Frame-Options; Reflected XSS Filtering; Sandboxing; Browser Sandboxing; IFrame Sandboxing; Anti-phishing and Anti-malware; Mixed Content; Core Security Problems; Attack Surface; Rate of Change; Silent Updating; Extensions; Plugins; Surrendering Control; TCP Protocol Control; Encrypted Communication; Same Origin Policy; Fallacies; Robustness Principle Fallacy; External Security Perimeter Fallacy; Browser Hacking Methodology; Initiating. | |
505 | 8 | |a Retaining Attacking; Summary; Questions; Notes; Chapter 2: Initiating Control; Understanding Control Initiation; Control Initiation Techniques; Using Cross-site Scripting Attacks; Reflected Cross-site Scripting; Stored Cross-site Scripting; DOM Cross-site Scripting; Universal Cross-site Scripting; XSS Viruses; Bypassing XSS Controls; Using Compromised Web Applications; Using Advertising Networks; Using Social Engineering Attacks; Phishing Attacks; Baiting; Anti-Phishing Controls; Using Man-in-the-Middle Attacks; Man-in-the-Browser; Wireless Attacks; ARP Spoofing; DNS Poisoning. | |
505 | 8 | |a Exploiting Caching Summary; Questions; Notes; Chapter 3: Retaining Control; Understanding Control Retention; Exploring Communication Techniques; Using XMLHttpRequest Polling; Using Cross-origin Resource Sharing; Using WebSocket Communication; Using Messaging Communication; Using DNS Tunnel Communication; Exploring Persistence Techniques; Using IFrames; Using Full Browser Frame Overlay; Using Browser Events; Using Pop-Under Windows; Using Man-in-the-Browser Attacks; Hijacking AJAX Calls; Hijacking Non-AJAX Requests; Evading Detection; Evasion using Encoding; Base64 Encoding; Whitespace Encoding. | |
505 | 8 | |a Non-alphanumeric JavaScript Evasion using Obfuscation; Random Variables and Methods; Mixing Object Notations; Time Delays; Mixing Content from Another Context; Using the callee Property; Evasion using JavaScript Engines Quirks; Summary; Questions; Notes; Chapter 4: Bypassing the Same; Understanding the Same Origin Policy; Understanding the SOP with the DOM; Understanding the SOP with CORS; Understanding the SOP with Plugins; Understanding the SOP with UI Redressing; Understanding the SOP with Browser History; Exploring SOP Bypasses; Bypassing SOP in Java; Bypassing SOP in Adobe Reader. Bypassing SOP in Adobe Flash. | |
520 | |a Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy; ARP spoofing, social engineering, and phishing to access browsers; DNS tunneling, attacking web applications, and proxying--all from the browser; Exploiting the browser and its ecosystem (plugins and extensions); Cross-origin attacks, including Inter-protocol Communication and Exploitation. The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.-- |c Publisher description | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
546 | |a English. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Browsers (Computer programs) |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer networks |x Access control. | |
650 | 6 | |a Navigateurs (Logiciels) |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
655 | 7 | |a Handbooks and manuals |2 fast | |
700 | 1 | |a Frichot, Christian. | |
700 | 1 | |a Orrù, Michele. | |
758 | |i has work: |a The Browser Hacker's Handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFG9kKhpfmpR7gxvFyY49C |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Alcorn, Wade. |t Browser hacker's handbook. |d Indianapolis, IN : Wiley, [2014] |z 9781118662090 |w (OCoLC)858361563 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118662090/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1641459 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH26202949 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26187056 | ||
938 | |a Books 24x7 |b B247 |n bks00063750 | ||
938 | |a Coutts Information Services |b COUT |n 27593039 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1641459 | ||
938 | |a ebrary |b EBRY |n ebr10842312 | ||
938 | |a EBSCOhost |b EBSC |n 709427 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis27593039 | ||
938 | |a Recorded Books, LLC |b RECE |n rbeEB00595822 | ||
938 | |a YBP Library Services |b YANK |n 11683504 | ||
994 | |a 92 |b IZTAP |