YoVDO

Breaching the Perimeter via Cloud Synchronized Browser Settings

Offered By: Black Hat via YouTube

Tags

Browser Security Courses Cybersecurity Courses Malware Courses Cloud Security Courses Data Breaches Courses Credential Theft Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 34-minute Black Hat conference talk that delves into the security vulnerabilities of cloud-synchronized browser settings. Discover how compromised browser sessions can be exploited to extract sensitive information like passwords and credit card details, and learn about unexpected attack vectors such as forcing users to visit malicious URLs. Examine novel techniques for leveraging these settings to compromise internal networks, including credential theft, local data breaches, malicious file execution, and automatic triggering of protocol handlers. Gain insights into the potential risks associated with consistent browser configurations across devices and understand the implications for perimeter security in modern computing environments.

Syllabus

Breaching the Perimeter via Cloud Synchronized Browser Settings


Taught by

Black Hat

Related Courses

Cyber Threats and Attack Vectors
University of Colorado System via Coursera
Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera
Information Security Operations Center ISOC for Non-Techies
Udemy
Cloud Data Security
University of Minnesota via Coursera
Network Security Basics
Pluralsight