The Browser Hacker's Handbook und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr
  • Alle Preisangaben inkl. MwSt.
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon.
Geschenkverpackung verfügbar.
The Browser Hacker's Hand... ist in Ihrem Einkaufwagen hinzugefügt worden
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Verkauft von Deal DE
Zustand: Gebraucht: Gut
Kommentar: Dieses Buch ist in gutem, sauberen Zustand. Seiten und Einband sind intakt.
Ihren Artikel jetzt
eintauschen und
EUR 15,00 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Alle 2 Bilder anzeigen

The Browser Hacker's Handbook (Englisch) Taschenbuch – 8. April 2014

Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 54,87
EUR 27,68 EUR 44,87
11 neu ab EUR 27,68 2 gebraucht ab EUR 44,87

Hinweise und Aktionen

  • Sparpaket: 3 Hörbücher für 33 EUR: Entdecken Sie unsere vielseitige Auswahl an reduzierten Hörbüchern und erhalten Sie 3 Hörbücher Ihrer Wahl für 33 EUR. Klicken Sie hier, um direkt zur Aktion zu gelangen.

Wird oft zusammen gekauft

The Browser Hacker's Handbook + Android Hacker's Handbook + Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Preis für alle drei: EUR 148,75

Die ausgewählten Artikel zusammen kaufen
Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr



Browsers have never been more vulnerable. Are you prepared?
The browser has essentially become the operating system of the modern era, and with that comes vulnerabilities on a scale not yet seen in IT security. The Browser Hacker's Handbook, written by an expert team of browser hackers, is the first book of its kind to offer a tutorial-based approach to understanding browser vulnerabilities and learning to defend your networks and critical systems from potential attacks.
This comprehensive guide will show you exactly how hackers target browsers and exploit their weaknesses to establish a beachhead and launch attacks deep into your network. Fight back with The Browser Hacker's Handbook.
Learn to:
* Exploit the most common vulnerabilities of Firefox®, Internet Explorer®, and Chrome(TM), as well as other browsers
* Leverage browsers as pivot points into a target's network when performing security assessments
* Initiate--and maintain--control over a target browser, giving you direct access to sensitive assets
* Exploit weaknesses in browser plugins and extensions, two of the most vulnerable entry points for the browser
* Use Inter-protocol Communication and Exploitation to further exploit internal network systems from the hooked browser
Visit the companion website at to download all the code examples in this book.

Über den Autor und weitere Mitwirkende

WADE ALCORN is the creator of the BeEF open source browser exploitation framework, among's top 10 security tools.
CHRISTIAN FRICHOT is a lead developer of BeEF, as well as a leader of the Perth Open Web Application Security Project.
MICHELE ORRÙ is the lead core developer of BeEF, as well as a vulnerability researcher and social engineer.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?

In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne

Die hilfreichsten Kundenrezensionen auf (beta) 12 Rezensionen
8 von 9 Kunden fanden die folgende Rezension hilfreich
The Browser Hacker's Handbook review 2. Juni 2014
Von Javier - Veröffentlicht auf
Format: Taschenbuch
As authors mention along the book, the web browser may be the most important piece of software currently. It dominates the client side in the server-client model.

This book covers the way how hackers and crackers attack the browser from a perspective of pretending to be a non-malicious web server sending valid communication to the web browser. The browser exploitation framework project (BeEF) is used to illustrate many of the practical attacks and techniques in the book.

The book is organized in 10 chapters based on the attacking method. They are: Web Browser Security, Initiating Control, Retaining Control, Bypassing the Same Origin Policy, Attacking Users, Attacking Browsers, Attacking Extensions, Attacking Plugins, Attacking Web Applications and Attacking Networks. The book closes with an epilogue exploring thoughts around the future of browser security.

One of the most interesting chapters in the book is the Web Browser Security section. It explores the micro-perimeter paradigm needed to defend organizations today, and examine some fallacies that continue to propagate insecure practices. Together with relevant browser concepts and core problems with browser security, it introduces the methodology used in the book. If you own some security background, I would say you can read chapters out of order but I would consider this first chapter as a must. It offers a great overview and context.

One of the strengths in this book is the level of detail with documentation, references and links. This material is updated.

In the weak side, this book is too long. I found this book lacking of rhythm along the most technical chapters but if you like the topics it won't be an issue.

In summary, I think this book is a good resource for pen-testers and offensive security practitioners. If offers an accurate vision of browsers security together with a methodology organizing the different and required offensive steps in a practical attack. With a possible second edition, I guess the authors should take in consideration a shorter book. I found this book a bit verbose but an interesting and useful resource.
7 von 8 Kunden fanden die folgende Rezension hilfreich
Outstanding 21. Mai 2014
Von GuyInNowhereland - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
a must-read if you are an application security engineer (like myself... not a lot of us out there but we're here...) and esp. if you do web app sec which is what I focus on... invaluable resource. A great, highly informative and useful book. Great follow on to Web App Hacker's Handbook which is The Bible for Web App Sec folks... a must-read!
5 von 6 Kunden fanden die folgende Rezension hilfreich
Great book! Really recommended 1. Mai 2014
Von Luca Carettoni - Veröffentlicht auf
Format: Taschenbuch
If you're a web security practitioner, this is a book that you need to read. From the basics to advanced topics, the authors illustrate numerous techniques that are extremely useful while breaking (or building) web applications. Really recommended if you want to learn how to circumvent browser security controls.
2 von 2 Kunden fanden die folgende Rezension hilfreich
A must read 20. Oktober 2014
Von Antonio Parata - Veröffentlicht auf
Format: Taschenbuch
If you are serious about your security assessments you have to read this book. The authors did a great work in describing in depth details how to use a hooked browser in order to exploit a vulnerable web site or to attack internal networks in a more proficient way.

If you think that the only thing that you can do in an hooked browser (for example by exploiting an XSS) is to show-up a pop-up or to try to grab the session cookie, then this book will open your mind.
A great read for anyone interested in browser-based attacks (and defenses) 5. November 2014
Von Andreas - Veröffentlicht auf
Format: Taschenbuch
The Browser Hacker's Handbook is a great read for anyone looking to go beyond traditional web application security and really learn to do what the bad guys are doing; attacking the user. It's crammed with examples and code snippets from a wide variety of coding languages and browsers, but you don't really need to be an expert in any of them to get the core message. The authors, who are a brilliant bunch, are also the main force behind the Browser Exploitation Framework (BeEF), and open source tool for penetration testing with a focus on web browsers. Because of this, the book is also a great BeEF primer, something that really helps the reader understand the power of the different attacks.

The Browser Hacker's Handbook is hands down the best book in the Hacker's Handbook series that I've read. It's a great complement to other books, and it gives the reader insights that I have not seen in any other book. I highly recommend it.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.