The Browser Hacker’s Handbook (2014)

The Browser Hacker’s Handbook (2014)

Introduction

Chapter 1. Web Browser Security

Chapter 2. Initiating Control

Chapter 3. Retaining Control

Chapter 4. Bypassing the Same Origin Policy

Chapter 5. Attacking Users

Chapter 6. Attacking Browsers

Chapter 7. Attacking Extensions

Chapter 8. Attacking Plugins

Chapter 9. Attacking Web Applications

Chapter 10. Attacking Networks

Chapter 11. Epilogue: Final Thoughts



All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)

If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.

© 2016-2025 All site design rights belong to S.Y.A.