0%

Book Description

Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education.
The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security.
This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.
  • Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
  • Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit—the client-side attack
  • Defend your network against attacks that target your company's most vulnerable asset—the end user

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication and Thanks
  6. Biography
  7. Chapter 1. Client-Side Attacks Defined
    1. Client-Side Attacks: An Overview
    2. Types of Client-Side Attacks
    3. Summary
  8. Chapter 2. Dissection of a Client-Side Attack
    1. What Constitutes a Client-Side Attack?
    2. Summary
    3. Reference
  9. Chapter 3. Protecting Web Browsers
    1. Common Functions of a Web Browser
    2. Microsoft Internet Explorer
    3. Mozilla Firefox
    4. Google Chrome
    5. Apple Safari
    6. Opera
    7. Web Browsers as a Target
    8. Summary
  10. Chapter 4. Security Issues with Web Browsers
    1. What is Being Exposed?
    2. Summary
  11. Chapter 5. Advanced Web Attacks
    1. What is Active Content?
    2. A Closer Look at Active Content Types
    3. Summary
  12. Chapter 6. Advanced Web Browser Defenses
    1. A Mix of Protective Measures
    2. Summary
  13. Chapter 7. Messaging Attacks and Defense
    1. Evolution of the Email Client
    2. Messaging Attacks and Defense
    3. Summary
  14. Chapter 8. Web Application Attacks
    1. Understanding Web Applications
    2. Web Application Attacks and Defense
    3. What’s the Target?
    4. Summary
  15. Chapter 9. Mobile Attacks
    1. Mobile Devices and Client-Side Attacks
    2. Summary
  16. Chapter 10. Securing Against Client-Side Attack
    1. Security Planning
    2. Securing Applications and Infrastructure
    3. Securing Clients
    4. Summary
  17. Index
3.145.40.189