Browsers have never been more vulnerable. Are you prepared?
The browser has essentially become the operating system of themodern era, and with that comes vulnerabilities on a scale not yetseen in IT security. The Browser Hacker’s Handbook,written by an expert team of browser hackers, is the first book ofits kind to offer a tutorial-based approach to understandingbrowser vulnerabilities and learning to defend your networks andcritical systems from potential attacks.
This comprehensive guide will show you exactly how hackerstarget browsers and exploit their weaknesses to establish abeachhead and launch attacks deep into your network. Fight backwith The Browser Hacker’s Handbook.
Exploit the most common vulnerabilities of Firefox®,Internet Explorer®, and Chrome™, as well as otherbrowsers
Leverage browsers as pivot points into a target’s networkwhen performing security assessments
Initiate—and maintain—control over a targetbrowser, giving you direct access to sensitive assets
Exploit weaknesses in browser plugins and extensions, two ofthe most vulnerable entry points for the browser
Use Inter-protocol Communication and Exploitation to furtherexploit internal network systems from the hooked browser
Visit the companion website at browserhacker.com todownload all the code examples in this book.