Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how to systematically scan and evaluate browser extensions for security vulnerabilities in this conference talk from DEF CON 33's Recon Village. Discover methodologies for identifying malicious or poorly secured browser extensions that could compromise user data and system security. Explore techniques for analyzing extension permissions, code quality, and potential attack vectors while understanding how threat actors exploit browser extensions as attack surfaces. Master practical approaches to scoring and ranking extensions based on their security posture, including automated scanning tools and manual analysis techniques. Gain insights into common extension vulnerabilities such as excessive permissions, insecure data handling, and malicious code injection. Understand the reconnaissance value of browser extensions in penetration testing and red team operations, including how extensions can be leveraged for persistence and data exfiltration. Develop skills in creating security assessment frameworks specifically designed for browser extension evaluation and learn to identify indicators of compromise within extension ecosystems.
Syllabus
DEF CON 33 Recon Village - Plug and Prey Scanning and Scoring Browser Extensions - Nishant Sharma
Taught by
DEFCONConference