This article is about Browser Attack Tutorial.
Information[Browser Attack Tutorial]:
In this mini-course you will learn about different types of web browsers; what each web browser does; how you can identify remote host browser names using methods such as HTTP headers and DOM properties. We know what http is, but do you know what http/2.0 is and how this protocol works? We explain this in a mini-course: why http/2.0 is needed and how it is much more secure than the current http protocol.
You will also learn about HTTP Cookies: how it works and why cookies are such an interesting part of evaluating web applications. Also what is browser cookiejar and its attributes like HTTPONLY, SECURE, DOMAIN etc. Also how you can bypass attribute restrictions. We also explain cookie container overflows as well as the cookie tracking technique that can be used to track your browsing habits and extract sensitive information.
HTTPS is always considered a secure protocol, but are you sure? In this tutorial, you will see how an attacker can bypass https and downgrade it to http. Finally, you’ll also learn about MITM using tools like Ettercap, fake certificates and SSL vulnerabilities like BEAST, CRIME, HEARTBLEED and browser autopwn, as well as the IE10 exploit with metasploit: our personal favorite tool. Click the button below to download your FREE ebook!