Client-Side Attacks and Defense
Format: PDF / Kindle (mobi) / ePub
Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education.
The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security.
This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.
- Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
- Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit―the client-side attack
- Defend your network against attacks that target your company's most vulnerable asset―the end user
represent a shift in the way attacks have taken place adding a powerful tool for gaining information from the systems of unsuspecting victims. Client-side attacks may be selected by an attacker as a way to gain information without having to go after the more heavily defended and protected server-side applications. Users have made themselves easy prey for client-side attacks due to a lack of or poorly maintained anti-virus, firewall, or antispyware that is common in this environment. Finally, the
151–152 Instant messaging programs (IM programs), 13 Instant web site ID, 156 Internet, 152 Internet Content Rating Association (ICRA), 154 Internet Explorer (IE), 52–53, 96, 147, 154 see also Apple Safari; Google Chrome; Mozilla Firefox; Opera ActiveX, 61–62 add-ons BHO, 59 MSHTML.dll, 60 SmartScreen filter, 60 vulnerability, 59 automatic crash recovery, 150 certificate support, 151 personal certificates, 151 website certificate, 151 configuring UAC settings, 148 content
the other browsers on the market such as Firefox. Microsoft developed IE to expose an Application Programming Interface (API) that allows developers to design and deploy special software applets called Browser Helper Objects (BHO) that can add additional menus, functions, and other features to the product. BHOs can be used to make the browser do more than it would otherwise including the ability to process new and different types of content including custom files and data. BHOs offer the ability
interest to those of us trying to prevent attacks against the client. Apple has dedicated some serious resources over the past few releases and years to improving the security of their browser to make it more resistant to attack. Included in these features are a more robust developer program, sandboxing features, and others. Table 3.2 highlights some of these additional security features. Note Transport Layer Security (TLS) grew from the original Secure Sockets Layer (SSL) protocol. Both
POP or IMAP protocols are used to retrieve the message for the client. Warning Much like POP and IMAP, SMTP is not encrypted or natively protected in any meaningful way. Understand this is very important for the security, network and messaging administrator as additional steps may need to be taken in order to provide the desired level of security for the organization. As a protocol SMTP plays a vital role in the messaging infrastructure and any disruption by a malicious party can easily