Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Plug and Prey - Scanning and Scoring Browser Extensions

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how to systematically scan and evaluate browser extensions for security vulnerabilities in this conference talk from DEF CON 33's Recon Village. Discover methodologies for identifying malicious or poorly secured browser extensions that could compromise user data and system security. Explore techniques for analyzing extension permissions, code quality, and potential attack vectors while understanding how threat actors exploit browser extensions as attack surfaces. Master practical approaches to scoring and ranking extensions based on their security posture, including automated scanning tools and manual analysis techniques. Gain insights into common extension vulnerabilities such as excessive permissions, insecure data handling, and malicious code injection. Understand the reconnaissance value of browser extensions in penetration testing and red team operations, including how extensions can be leveraged for persistence and data exfiltration. Develop skills in creating security assessment frameworks specifically designed for browser extension evaluation and learn to identify indicators of compromise within extension ecosystems.

Syllabus

DEF CON 33 Recon Village - Plug and Prey Scanning and Scoring Browser Extensions - Nishant Sharma

Taught by

DEFCONConference

Reviews

Start your review of Plug and Prey - Scanning and Scoring Browser Extensions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.