Crafting the Next-Generation Man-in-the-Browser Trojan

Crafting the Next-Generation Man-in-the-Browser Trojan

OWASP Foundation via YouTube Direct link

Content Security Policy

8 of 40

8 of 40

Content Security Policy

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Crafting the Next-Generation Man-in-the-Browser Trojan

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What are ManintheBrowser attacks
  3. 3 History of JEN
  4. 4 Timba
  5. 5 Trojan Capabilities
  6. 6 Top 10 Trojan Variants
  7. 7 Financial Losses
  8. 8 Content Security Policy
  9. 9 HTTP Public Key Pinning
  10. 10 SSL Transport Security
  11. 11 Headers
  12. 12 Trojan
  13. 13 Starting point
  14. 14 Extensions are dangerous
  15. 15 Requirements
  16. 16 C2 Requirements
  17. 17 Web Requests API
  18. 18 Can you modify the response body
  19. 19 Debugging the browser
  20. 20 Changing the DOM
  21. 21 Architecture
  22. 22 Demos
  23. 23 Testing
  24. 24 Grabber
  25. 25 Dumb Taming
  26. 26 Strategy
  27. 27 Polymorphism
  28. 28 Our thoughts
  29. 29 Other solutions
  30. 30 Realtime monitoring
  31. 31 Final demo
  32. 32 Wrapping up
  33. 33 Conclusion
  34. 34 How easy is it
  35. 35 Traditional approach
  36. 36 Who can be tricked
  37. 37 Extension icons
  38. 38 Missing
  39. 39 Mozilla
  40. 40 CSP in Meta Tags

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.