The Browser Hacker’s Handbook (2014)

The Browser Hacker’s Handbook (2014)

Introduction

Chapter 1. Web Browser Security

Chapter 2. Initiating Control

Chapter 3. Retaining Control

Chapter 4. Bypassing the Same Origin Policy

Chapter 5. Attacking Users

Chapter 6. Attacking Browsers

Chapter 7. Attacking Extensions

Chapter 8. Attacking Plugins

Chapter 9. Attacking Web Applications

Chapter 10. Attacking Networks

Chapter 11. Epilogue: Final Thoughts