Exploiting browsers
Web browsers are used primarily for surfing the Web. However, an outdated web browser can compromise the entire system. Clients may never use the preinstalled web browser and choose one based on their preference. However, the default preinstalled web browser can still lead to various attacks on it. Exploiting a browser by finding vulnerabilities in the browser components is browser-based exploitation.
Note
For more information on various browser-based vulnerabilities, refer to Mozilla Firefox-based vulnerabilities at http://www.cvedetails.com/product/3264/Mozilla-Firefox.html?vendor_id=452.
Also, refer to Internet Explorer-based vulnerabilities at http://www.cvedetails.com/product/9900/Microsoft-Internet-Explorer.html?vendor_id=26.
The workings of the browser autopwn attack
Metasploit offers browser autopwn, a special automatic attack vector that tests various browsers in order to find vulnerabilities in it and exploit the same. To understand the working of this method, let...