Browser Security and Exploitation

  1. Browser Security Models
    1. Same-Origin Policy
      1. Origin Definition Components
        1. Protocol Scheme
          1. Domain Name
            1. Port Number
            2. SOP Enforcement Areas
              1. DOM Access Control
                1. Network Request Restrictions
                  1. Storage Partitioning
                  2. Cross-Origin Communication
                    1. Cross-Origin Resource Sharing
                      1. Simple Requests
                        1. Preflight Requests
                          1. Credential Handling
                          2. PostMessage API
                            1. Message Passing Security
                              1. Origin Verification
                              2. Document Domain Relaxation
                                1. Subdomain Communication
                                  1. Security Implications
                                  2. JSONP Technique
                                    1. Implementation Method
                                      1. Security Vulnerabilities
                                  3. Browser Sandboxing
                                    1. Sandboxing Principles
                                      1. Process Isolation
                                        1. Privilege Separation
                                          1. Resource Access Control
                                          2. Chromium Sandbox Architecture
                                            1. Broker Process Model
                                              1. Target Process Restrictions
                                                1. Security Token Management
                                                2. Firefox Sandbox Implementation
                                                  1. Content Process Isolation
                                                    1. Security Level Configuration
                                                      1. IPC Security
                                                      2. Sandbox Escape Techniques
                                                        1. Kernel Exploitation
                                                          1. IPC Abuse
                                                            1. Privilege Escalation
                                                          2. Content Security Policy
                                                            1. CSP Directive Types
                                                              1. Source Directives
                                                                1. Reporting Directives
                                                                2. CSP Implementation
                                                                  1. Header-Based Deployment
                                                                    1. Meta Tag Implementation
                                                                      1. Violation Reporting
                                                                      2. CSP Bypass Techniques
                                                                        1. Policy Misconfiguration
                                                                          1. Script Gadget Abuse
                                                                            1. JSONP Injection
                                                                          2. Security Headers
                                                                            1. HTTP Strict Transport Security
                                                                              1. HSTS Directive Options
                                                                                1. Preload List Mechanism
                                                                                  1. Subdomain Inclusion
                                                                                  2. Content Type Options
                                                                                    1. MIME Sniffing Prevention
                                                                                      1. Security Implications
                                                                                      2. Frame Options
                                                                                        1. Clickjacking Protection
                                                                                          1. Frame Embedding Control
                                                                                          2. Referrer Policy
                                                                                            1. Referrer Information Control
                                                                                              1. Privacy Implications
                                                                                              2. Cross-Origin Policies
                                                                                                1. Cross-Origin-Opener-Policy
                                                                                                  1. Cross-Origin-Embedder-Policy
                                                                                                    1. Cross-Origin-Resource-Policy