Client-Side Attacks and Defense

Client-Side Attacks and Defense

Robert Shimonski

Language: English

Pages: 296

ISBN: 1597495905

Format: PDF / Kindle (mobi) / ePub

Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education.
The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security.
This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.

  • Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
  • Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit―the client-side attack
  • Defend your network against attacks that target your company's most vulnerable asset―the end user

C Interfaces and Implementations: Techniques for Creating Reusable Software

Systems Analysis and Design in a Changing World (5th Edition)

Digital Memory and the Archive (Electronic Mediations)

Cognitive Networked Sensing and Big Data













represent a shift in the way attacks have taken place adding a powerful tool for gaining information from the systems of unsuspecting victims. Client-side attacks may be selected by an attacker as a way to gain information without having to go after the more heavily defended and protected server-side applications. Users have made themselves easy prey for client-side attacks due to a lack of or poorly maintained anti-virus, firewall, or antispyware that is common in this environment. Finally, the

151–152 Instant messaging programs (IM programs), 13 Instant web site ID, 156 Internet, 152 Internet Content Rating Association (ICRA), 154 Internet Explorer (IE), 52–53, 96, 147, 154 see also Apple Safari; Google Chrome; Mozilla Firefox; Opera ActiveX, 61–62 add-ons BHO, 59 MSHTML.dll, 60 SmartScreen filter, 60 vulnerability, 59 automatic crash recovery, 150 certificate support, 151 personal certificates, 151 website certificate, 151 configuring UAC settings, 148 content

the other browsers on the market such as Firefox. Microsoft developed IE to expose an Application Programming Interface (API) that allows developers to design and deploy special software applets called Browser Helper Objects (BHO) that can add additional menus, functions, and other features to the product. BHOs can be used to make the browser do more than it would otherwise including the ability to process new and different types of content including custom files and data. BHOs offer the ability

interest to those of us trying to prevent attacks against the client. Apple has dedicated some serious resources over the past few releases and years to improving the security of their browser to make it more resistant to attack. Included in these features are a more robust developer program, sandboxing features, and others. Table 3.2 highlights some of these additional security features. Note Transport Layer Security (TLS) grew from the original Secure Sockets Layer (SSL) protocol. Both

POP or IMAP protocols are used to retrieve the message for the client. Warning Much like POP and IMAP, SMTP is not encrypted or natively protected in any meaningful way. Understand this is very important for the security, network and messaging administrator as additional steps may need to be taken in order to provide the desired level of security for the organization. As a protocol SMTP plays a vital role in the messaging infrastructure and any disruption by a malicious party can easily

Download sample


About admin