March 2014
Intermediate to advanced
648 pages
16h 56m
English
Content preview from The Browser Hacker's HandbookBecome an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
Start your free trial



Contents
Chapter 1 Web Browser Security
Symbiosis with the Web Application
Anti-phishing and Anti-malware
Understanding Control Initiation
Using Cross-site Scripting Attacks
Using Compromised Web Applications
Using Social Engineering Attacks
Using Man-in-the-Middle Attacks
Understanding Control Retention
Exploring Communication Techniques
Using Cross-origin Resource Sharing
Using DNS Tunnel Communication
Exploring Persistence Techniques
Using Man-in-the-Browser Attacks
Chapter 4 Bypassing the Same Origin Policy
Understanding the Same Origin Policy