UsefulLinks
Computer Science
Cybersecurity
Browser Security and Exploitation
1. Introduction to Browser Security
2. Browser Architecture Fundamentals
3. Web Technology Foundations
4. Browser Security Models
5. Vulnerability Classifications
6. Browser Exploitation Methodology
7. Exploitation Primitives and Techniques
8. JavaScript Engine Exploitation
9. DOM and Rendering Engine Exploitation
10. Browser Hardening and Mitigations
11. Vulnerability Research Methods
12. Browser Extensions and Plugin Security
13. Emerging Attack Surfaces
14. Security Analysis Tools
3.
Web Technology Foundations
3.1.
HTTP Protocol Family
3.1.1.
HTTP Methods and Semantics
3.1.2.
HTTP Headers and Security
3.1.3.
Status Codes and Error Handling
3.1.4.
HTTP/2 and HTTP/3 Features
3.2.
HTTPS and Transport Security
3.2.1.
TLS Handshake Process
3.2.2.
Certificate Validation
3.2.3.
Cipher Suite Selection
3.2.4.
Perfect Forward Secrecy
3.3.
HTML Document Structure
3.3.1.
Element Types and Attributes
3.3.2.
Form Processing
3.3.3.
Embedded Content Security
3.3.4.
HTML5 Security Features
3.4.
CSS Styling System
3.4.1.
Selector Mechanisms
3.4.2.
Inheritance and Cascade
3.4.3.
CSSOM API
3.4.4.
CSS Security Considerations
3.5.
JavaScript Language
3.5.1.
Core Language Features
3.5.2.
Event-Driven Programming
3.5.3.
Asynchronous Programming Patterns
3.5.4.
Error Handling Mechanisms
3.6.
Document Object Model
3.6.1.
DOM Tree Structure
3.6.2.
Node Types and Properties
3.6.3.
DOM Manipulation APIs
3.6.4.
Event System
3.6.5.
Event Propagation Models
3.7.
Browser Object Model
3.7.1.
Window Object Properties
3.7.2.
Navigator Object Information
3.7.3.
Location Object Methods
3.7.4.
History API
3.7.5.
Storage APIs
Previous
2. Browser Architecture Fundamentals
Go to top
Next
4. Browser Security Models