Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible
 

The Browser Hacker's Handbook [Format Kindle]

Wade Alcorn , Christian Frichot , Michele Orru

Prix conseillé : EUR 46,42 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 51,89
Prix Kindle : EUR 38,31 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 13,58 (26%)

  • Longueur : 648 pages
  • Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger
  • Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.
App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 38,31  
Broché EUR 54,73  





Descriptions du produit

Présentation de l'éditeur

Hackers exploit browser vulnerabilities to attack deep withinnetworks

The Browser Hacker's Handbook gives a practicalunderstanding of hacking the everyday web browser and using it as abeachhead to launch further attacks deep into corporate networks.Written by a team of highly experienced computer security experts,the handbook provides hands-on tutorials exploring a range ofcurrent attack methods.

The web browser has become the most popular and widely usedcomputer "program" in the world. As the gateway to the Internet, itis part of the storefront to any business that operates online, butit is also one of the most vulnerable entry points of any system.With attacks on the rise, companies are increasingly employingbrowser-hardening techniques to protect the unique vulnerabilitiesinherent in all currently used browsers. The Browser Hacker'sHandbook thoroughly covers complex security issues and exploresrelevant topics such as:

  • Bypassing the Same Origin Policy
  • ARP spoofing, social engineering, and phishing to accessbrowsers
  • DNS tunneling, attacking web applications, andproxying—all from the browser
  • Exploiting the browser and its ecosystem (plugins andextensions)
  • Cross-origin attacks, including Inter-protocol Communicationand Exploitation

The Browser Hacker's Handbook is written with aprofessional security engagement in mind. Leveraging browsers aspivot points into a target's network should form an integralcomponent into any social engineering or red-team securityassessment. This handbook provides a complete methodology tounderstand and structure your next browser penetration test.

Quatrième de couverture

Browsers have never been more vulnerable.
Are you prepared?

The browser has essentially become the operating system of the modern era, and with that comes vulnerabilities on a scale not yet seen in IT security. The Browser Hacker s Handbook, written by an expert team of browser hackers, is the first book of its kind to offer a tutorial–based approach to understanding browser vulnerabilities and learning to defend your networks and critical systems from potential attacks.

This comprehensive guide will show you exactly how hackers target browsers and exploit their weaknesses to establish a beachhead and launch attacks deep into your network. Fight back with The Browser Hacker s Handbook.

Learn to:

  • Exploit the most common vulnerabilities of Firefox®, Internet Explorer®, and Chrome , as well as other browsers
  • Leverage browsers as pivot points into a target s network when performing security assessments
  • Initiate and maintain control over a target browser, giving you direct access to sensitive assets
  • Exploit weaknesses in browser plugins and extensions, two of the most vulnerable entry points for the browser
  • Use Inter–protocol Communication and Exploitation to further exploit internal network systems from the hooked browser

Visit the companion website at browserhacker.com to download all the code examples in this book.


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 29158 KB
  • Nombre de pages de l'édition imprimée : 648 pages
  • Editeur : Wiley; Édition : 1 (26 février 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00JV5JDM6
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Classement des meilleures ventes d'Amazon: n°53.632 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.8 étoiles sur 5  12 commentaires
8 internautes sur 9 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 The Browser Hacker's Handbook review 2 juin 2014
Par Javier - Publié sur Amazon.com
Format:Broché
As authors mention along the book, the web browser may be the most important piece of software currently. It dominates the client side in the server-client model.

This book covers the way how hackers and crackers attack the browser from a perspective of pretending to be a non-malicious web server sending valid communication to the web browser. The browser exploitation framework project (BeEF) is used to illustrate many of the practical attacks and techniques in the book.

The book is organized in 10 chapters based on the attacking method. They are: Web Browser Security, Initiating Control, Retaining Control, Bypassing the Same Origin Policy, Attacking Users, Attacking Browsers, Attacking Extensions, Attacking Plugins, Attacking Web Applications and Attacking Networks. The book closes with an epilogue exploring thoughts around the future of browser security.

One of the most interesting chapters in the book is the Web Browser Security section. It explores the micro-perimeter paradigm needed to defend organizations today, and examine some fallacies that continue to propagate insecure practices. Together with relevant browser concepts and core problems with browser security, it introduces the methodology used in the book. If you own some security background, I would say you can read chapters out of order but I would consider this first chapter as a must. It offers a great overview and context.

One of the strengths in this book is the level of detail with documentation, references and links. This material is updated.

In the weak side, this book is too long. I found this book lacking of rhythm along the most technical chapters but if you like the topics it won't be an issue.

In summary, I think this book is a good resource for pen-testers and offensive security practitioners. If offers an accurate vision of browsers security together with a methodology organizing the different and required offensive steps in a practical attack. With a possible second edition, I guess the authors should take in consideration a shorter book. I found this book a bit verbose but an interesting and useful resource.
7 internautes sur 8 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Outstanding 21 mai 2014
Par GuyInNowhereland - Publié sur Amazon.com
Format:Broché|Achat vérifié
a must-read if you are an application security engineer (like myself... not a lot of us out there but we're here...) and esp. if you do web app sec which is what I focus on... invaluable resource. A great, highly informative and useful book. Great follow on to Web App Hacker's Handbook which is The Bible for Web App Sec folks... a must-read!
5 internautes sur 6 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great book! Really recommended 1 mai 2014
Par Luca Carettoni - Publié sur Amazon.com
Format:Broché
If you're a web security practitioner, this is a book that you need to read. From the basics to advanced topics, the authors illustrate numerous techniques that are extremely useful while breaking (or building) web applications. Really recommended if you want to learn how to circumvent browser security controls.
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A must read 20 octobre 2014
Par Antonio Parata - Publié sur Amazon.com
Format:Broché
If you are serious about your security assessments you have to read this book. The authors did a great work in describing in depth details how to use a hooked browser in order to exploit a vulnerable web site or to attack internal networks in a more proficient way.

If you think that the only thing that you can do in an hooked browser (for example by exploiting an XSS) is to show-up a pop-up or to try to grab the session cookie, then this book will open your mind.
5.0 étoiles sur 5 A great read for anyone interested in browser-based attacks (and defenses) 5 novembre 2014
Par Andreas - Publié sur Amazon.com
Format:Broché
The Browser Hacker's Handbook is a great read for anyone looking to go beyond traditional web application security and really learn to do what the bad guys are doing; attacking the user. It's crammed with examples and code snippets from a wide variety of coding languages and browsers, but you don't really need to be an expert in any of them to get the core message. The authors, who are a brilliant bunch, are also the main force behind the Browser Exploitation Framework (BeEF), and open source tool for penetration testing with a focus on web browsers. Because of this, the book is also a great BeEF primer, something that really helps the reader understand the power of the different attacks.

The Browser Hacker's Handbook is hands down the best book in the Hacker's Handbook series that I've read. It's a great complement to other books, and it gives the reader insights that I have not seen in any other book. I highly recommend it.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique