Browser Hacker's Handbook:
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced co...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
Wiley
2014
|
Ausgabe: | 1st ed |
Schlagworte: | |
Zusammenfassung: | Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying-all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (650 pages) |
ISBN: | 9781118662106 9781118662090 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043607985 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118662106 |9 978-1-118-66210-6 | ||
020 | |a 9781118662090 |c Print |9 978-1-118-66209-0 | ||
035 | |a (ZDB-30-PQE)EBC1641459 | ||
035 | |a (ZDB-89-EBL)EBL1641459 | ||
035 | |a (ZDB-38-EBR)ebr10842312 | ||
035 | |a (OCoLC)871225516 | ||
035 | |a (DE-599)BVBBV043607985 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Alcorn, Wade |e Verfasser |4 aut | |
245 | 1 | 0 | |a Browser Hacker's Handbook |
250 | |a 1st ed | ||
264 | 1 | |a Somerset |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (650 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying-all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test | ||
650 | 4 | |a Computer hackers -- Handbooks, manuals, etc | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Browser |0 (DE-588)4423006-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Browser |0 (DE-588)4423006-0 |D s |
689 | 0 | 2 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Frichot, Christian |e Sonstige |4 oth | |
700 | 1 | |a Orru, Michele |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Alcorn, Wade |t Browser Hacker's Handbook |
912 | |a ZDB-30-PQE |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029022044 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176354589016064 |
---|---|
any_adam_object | |
author | Alcorn, Wade |
author_facet | Alcorn, Wade |
author_role | aut |
author_sort | Alcorn, Wade |
author_variant | w a wa |
building | Verbundindex |
bvnumber | BV043607985 |
collection | ZDB-30-PQE ZDB-38-ESG |
ctrlnum | (ZDB-30-PQE)EBC1641459 (ZDB-89-EBL)EBL1641459 (ZDB-38-EBR)ebr10842312 (OCoLC)871225516 (DE-599)BVBBV043607985 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03363nmm a2200505zc 4500</leader><controlfield tag="001">BV043607985</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118662106</subfield><subfield code="9">978-1-118-66210-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118662090</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-118-66209-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1641459</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1641459</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10842312</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)871225516</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043607985</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alcorn, Wade</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Browser Hacker's Handbook</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (650 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying-all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers -- Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Browser</subfield><subfield code="0">(DE-588)4423006-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Browser</subfield><subfield code="0">(DE-588)4423006-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frichot, Christian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Orru, Michele</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Alcorn, Wade</subfield><subfield code="t">Browser Hacker's Handbook</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029022044</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043607985 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:51Z |
institution | BVB |
isbn | 9781118662106 9781118662090 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029022044 |
oclc_num | 871225516 |
open_access_boolean | |
physical | 1 online resource (650 pages) |
psigel | ZDB-30-PQE ZDB-38-ESG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Alcorn, Wade Verfasser aut Browser Hacker's Handbook 1st ed Somerset Wiley 2014 © 2014 1 online resource (650 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying-all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test Computer hackers -- Handbooks, manuals, etc Computersicherheit (DE-588)4274324-2 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Browser (DE-588)4423006-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Browser (DE-588)4423006-0 s Hacker (DE-588)4113821-1 s 1\p DE-604 Frichot, Christian Sonstige oth Orru, Michele Sonstige oth Erscheint auch als Druck-Ausgabe Alcorn, Wade Browser Hacker's Handbook 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Alcorn, Wade Browser Hacker's Handbook Computer hackers -- Handbooks, manuals, etc Computersicherheit (DE-588)4274324-2 gnd Hacker (DE-588)4113821-1 gnd Browser (DE-588)4423006-0 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4113821-1 (DE-588)4423006-0 |
title | Browser Hacker's Handbook |
title_auth | Browser Hacker's Handbook |
title_exact_search | Browser Hacker's Handbook |
title_full | Browser Hacker's Handbook |
title_fullStr | Browser Hacker's Handbook |
title_full_unstemmed | Browser Hacker's Handbook |
title_short | Browser Hacker's Handbook |
title_sort | browser hacker s handbook |
topic | Computer hackers -- Handbooks, manuals, etc Computersicherheit (DE-588)4274324-2 gnd Hacker (DE-588)4113821-1 gnd Browser (DE-588)4423006-0 gnd |
topic_facet | Computer hackers -- Handbooks, manuals, etc Computersicherheit Hacker Browser |
work_keys_str_mv | AT alcornwade browserhackershandbook AT frichotchristian browserhackershandbook AT orrumichele browserhackershandbook |