Book Image

Mastering Metasploit

By : Nipun Jaswal
Book Image

Mastering Metasploit

By: Nipun Jaswal

Overview of this book

Table of Contents (17 chapters)
Mastering Metasploit
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Exploiting browsers


Web browsers are used primarily for surfing the Web. However, an outdated web browser can compromise the entire system. Clients may never use the preinstalled web browser and choose one based on their preference. However, the default preinstalled web browser can still lead to various attacks on it. Exploiting a browser by finding vulnerabilities in the browser components is browser-based exploitation.

Note

For more information on various browser-based vulnerabilities, refer to Mozilla Firefox-based vulnerabilities at http://www.cvedetails.com/product/3264/Mozilla-Firefox.html?vendor_id=452.

Also, refer to Internet Explorer-based vulnerabilities at http://www.cvedetails.com/product/9900/Microsoft-Internet-Explorer.html?vendor_id=26.

The workings of the browser autopwn attack

Metasploit offers browser autopwn, a special automatic attack vector that tests various browsers in order to find vulnerabilities in it and exploit the same. To understand the working of this method, let...