undrgrnd Cliquez ici Toys NEWNEEEW nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici Soldes Cliquez ici Acheter Fire Achetez Kindle Paperwhite cliquez_ici Jeux Vidéo Montres soldes Bijoux Soldes

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

The Browser Hacker's Handbook [Format Kindle]

Wade Alcorn , Christian Frichot , Michele Orru

Prix conseillé : EUR 52,75 De quoi s'agit-il ?
Prix livre imprimé : EUR 51,77
Prix Kindle : EUR 36,41 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 15,36 (30%)

  • Longueur : 648 pages
  • Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger
  • Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.
App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 36,41  
Broché EUR 52,01  
-40%, -50%, -60%, -70%... Découvrez les Soldes Amazon jusqu'au 16 février 2016 inclus. Profitez-en !

Les clients ayant acheté cet article ont également acheté

Cette fonction d'achat continuera à charger les articles. Pour naviguer hors de ce carrousel, veuillez utiliser votre touche de raccourci d'en-tête pour naviguer vers l'en-tête précédente ou suivante.

Descriptions du produit

Présentation de l'éditeur

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.

The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as:

  • Bypassing the Same Origin Policy
  • ARP spoofing, social engineering, and phishing to access browsers
  • DNS tunneling, attacking web applications, and proxying—all from the browser
  • Exploiting the browser and its ecosystem (plugins and extensions)
  • Cross-origin attacks, including Inter-protocol Communication and Exploitation

The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

Quatrième de couverture

Browsers have never been more vulnerable.
Are you prepared?

The browser has essentially become the operating system of the modern era, and with that comes vulnerabilities on a scale not yet seen in IT security. The Browser Hacker s Handbook, written by an expert team of browser hackers, is the first book of its kind to offer a tutorial–based approach to understanding browser vulnerabilities and learning to defend your networks and critical systems from potential attacks.

This comprehensive guide will show you exactly how hackers target browsers and exploit their weaknesses to establish a beachhead and launch attacks deep into your network. Fight back with The Browser Hacker s Handbook.

Learn to:

  • Exploit the most common vulnerabilities of Firefox®, Internet Explorer®, and Chrome , as well as other browsers
  • Leverage browsers as pivot points into a target s network when performing security assessments
  • Initiate and maintain control over a target browser, giving you direct access to sensitive assets
  • Exploit weaknesses in browser plugins and extensions, two of the most vulnerable entry points for the browser
  • Use Inter–protocol Communication and Exploitation to further exploit internal network systems from the hooked browser

Visit the companion website at browserhacker.com to download all the code examples in this book.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 35068 KB
  • Nombre de pages de l'édition imprimée : 648 pages
  • Editeur : Wiley; Édition : 1 (26 février 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00JV5JDM6
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Activé
  • Classement des meilleures ventes d'Amazon: n°157.206 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.6 étoiles sur 5  13 commentaires
7 internautes sur 8 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Outstanding 21 mai 2014
Par GetMeOutOfStLouis - Publié sur Amazon.com
Format:Broché|Achat vérifié
a must-read if you are an application security engineer (like myself... not a lot of us out there but we're here...) and esp. if you do web app sec which is what I focus on... invaluable resource. A great, highly informative and useful book. Great follow on to Web App Hacker's Handbook which is The Bible for Web App Sec folks... a must-read!
8 internautes sur 10 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 The Browser Hacker's Handbook review 2 juin 2014
Par Javier - Publié sur Amazon.com
As authors mention along the book, the web browser may be the most important piece of software currently. It dominates the client side in the server-client model.

This book covers the way how hackers and crackers attack the browser from a perspective of pretending to be a non-malicious web server sending valid communication to the web browser. The browser exploitation framework project (BeEF) is used to illustrate many of the practical attacks and techniques in the book.

The book is organized in 10 chapters based on the attacking method. They are: Web Browser Security, Initiating Control, Retaining Control, Bypassing the Same Origin Policy, Attacking Users, Attacking Browsers, Attacking Extensions, Attacking Plugins, Attacking Web Applications and Attacking Networks. The book closes with an epilogue exploring thoughts around the future of browser security.

One of the most interesting chapters in the book is the Web Browser Security section. It explores the micro-perimeter paradigm needed to defend organizations today, and examine some fallacies that continue to propagate insecure practices. Together with relevant browser concepts and core problems with browser security, it introduces the methodology used in the book. If you own some security background, I would say you can read chapters out of order but I would consider this first chapter as a must. It offers a great overview and context.

One of the strengths in this book is the level of detail with documentation, references and links. This material is updated.

In the weak side, this book is too long. I found this book lacking of rhythm along the most technical chapters but if you like the topics it won't be an issue.

In summary, I think this book is a good resource for pen-testers and offensive security practitioners. If offers an accurate vision of browsers security together with a methodology organizing the different and required offensive steps in a practical attack. With a possible second edition, I guess the authors should take in consideration a shorter book. I found this book a bit verbose but an interesting and useful resource.
6 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great book! Really recommended 1 mai 2014
Par Luca Carettoni - Publié sur Amazon.com
If you're a web security practitioner, this is a book that you need to read. From the basics to advanced topics, the authors illustrate numerous techniques that are extremely useful while breaking (or building) web applications. Really recommended if you want to learn how to circumvent browser security controls.
3 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A must read 20 octobre 2014
Par Antonio Parata - Publié sur Amazon.com
If you are serious about your security assessments you have to read this book. The authors did a great work in describing in depth details how to use a hooked browser in order to exploit a vulnerable web site or to attack internal networks in a more proficient way.

If you think that the only thing that you can do in an hooked browser (for example by exploiting an XSS) is to show-up a pop-up or to try to grab the session cookie, then this book will open your mind.
5.0 étoiles sur 5 A great read for anyone interested in browser-based attacks (and defenses) 5 novembre 2014
Par Andreas - Publié sur Amazon.com
The Browser Hacker's Handbook is a great read for anyone looking to go beyond traditional web application security and really learn to do what the bad guys are doing; attacking the user. It's crammed with examples and code snippets from a wide variety of coding languages and browsers, but you don't really need to be an expert in any of them to get the core message. The authors, who are a brilliant bunch, are also the main force behind the Browser Exploitation Framework (BeEF), and open source tool for penetration testing with a focus on web browsers. Because of this, the book is also a great BeEF primer, something that really helps the reader understand the power of the different attacks.

The Browser Hacker's Handbook is hands down the best book in the Hacker's Handbook series that I've read. It's a great complement to other books, and it gives the reader insights that I have not seen in any other book. I highly recommend it.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique