Contents
Chapter 1 Web Browser Security
Symbiosis with the Web Application
Anti-phishing and Anti-malware
Understanding Control Initiation
Using Cross-site Scripting Attacks
Using Compromised Web Applications
Using Social Engineering Attacks
Using Man-in-the-Middle Attacks
Understanding Control Retention
Exploring Communication Techniques
Using Cross-origin Resource Sharing
Using DNS Tunnel Communication
Exploring Persistence Techniques
Using Man-in-the-Browser Attacks
Chapter 4 Bypassing the Same Origin Policy
Understanding the Same Origin Policy
Get The Browser Hacker's Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.