Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Crafting the Next-Generation Man-in-the-Browser Trojan
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What are ManintheBrowser attacks
- 3 History of JEN
- 4 Timba
- 5 Trojan Capabilities
- 6 Top 10 Trojan Variants
- 7 Financial Losses
- 8 Content Security Policy
- 9 HTTP Public Key Pinning
- 10 SSL Transport Security
- 11 Headers
- 12 Trojan
- 13 Starting point
- 14 Extensions are dangerous
- 15 Requirements
- 16 C2 Requirements
- 17 Web Requests API
- 18 Can you modify the response body
- 19 Debugging the browser
- 20 Changing the DOM
- 21 Architecture
- 22 Demos
- 23 Testing
- 24 Grabber
- 25 Dumb Taming
- 26 Strategy
- 27 Polymorphism
- 28 Our thoughts
- 29 Other solutions
- 30 Realtime monitoring
- 31 Final demo
- 32 Wrapping up
- 33 Conclusion
- 34 How easy is it
- 35 Traditional approach
- 36 Who can be tricked
- 37 Extension icons
- 38 Missing
- 39 Mozilla
- 40 CSP in Meta Tags