Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook by Novelli Stefano & Silvestri Marco
Author:Novelli, Stefano & Silvestri, Marco [Novelli, Stefano]
Language: eng
Format: mobi
Published: 2019-03-20T16:00:00+00:00
Figure 23: results of a conventional Opera browser on Panopticlick
6.10.2 Defending yourself from Browser Fingerprinting
If you accurately followed each single recommendation from the previous topics, your browser is probably quite secure. You can do more, however. The trick is changing the game, handling the aforementioned resources. Each browser allows some “covering-up”, such as changing the font list, disabling plug-ins, etc. However, this topic would require more than a single book! You can use some extensions/add-ons, though, for example:
- FireGloves[79], available for Mozilla Firefox
- StopFingerprinting[80], available for Google Chrome
6.11 File Downloading
This category includes all the files that are downloaded but, once opened, may reveal information about your online data. When you need to open any files, you should use tools like a Virtual Machine on a host computer not connected to Internet. Files downloaded from the Internet may contain executable code capable of communicating outside the anonymous network: for example, with the proper knowledge, some arbitrary scripting code can be inserted into Word or PDF files, not mentioning, of course, the classic executables available for your operating system (.exe, .dmg, .sh and so on).
6.12 Browser Security Test
Browser Security is a very complex and ever changing topic, and requires an extensive knowledge from multiple fields. Currently, the most complete and reliable tool to test your browser and its security is offered by BrowserSPY[81], allowing to verify the existence, or rather the exposition, of any technology in the browser.
Using this tool is quite simple: each item on the left side of the screen will open a technology summary tab, and a list of values exposed to the network. You must ensure that all the items that may somehow compromise your anonymity are properly hidden, possibly exploring the ones that have not been covered in this document.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7789)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6423)
Kotlin in Action by Dmitry Jemerov(5073)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3845)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3090)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2613)
Drugs Unlimited by Mike Power(2475)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2350)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2266)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2252)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2140)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2081)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(1996)
