Browser (Chrome) extensions can often be overlooked in an enterprise environment. They offer would-be attackers’ access to all sorts of potentially sensitive information. In order to find interesting ones there are a number of tools and data analysis techniques available. Some of these tools and techniques will be covered so you can hunt through your organizations Chrome extensions in a meaningful way, and understand the risk they pose.