Browser Security and Exploitation

  1. Browser Exploitation Methodology
    1. Initial Code Execution
      1. Vulnerability Triggering
        1. Input Vector Identification
          1. Exploit Payload Delivery
            1. Reliability Improvement
            2. Control Flow Hijacking
              1. Instruction Pointer Control
                1. Return Address Overwrite
                  1. Virtual Function Table Corruption
                  2. Shellcode Execution
                    1. Shellcode Development
                      1. Payload Encoding
                        1. Environment Constraints
                      2. Mitigation Bypass Techniques
                        1. Address Space Layout Randomization Bypass
                          1. Information Leak Exploitation
                            1. Heap Spray Techniques
                              1. Partial ASLR Bypass
                              2. Data Execution Prevention Bypass
                                1. Return-Oriented Programming
                                  1. Jump-Oriented Programming
                                    1. JIT Code Reuse
                                    2. Control Flow Integrity Bypass
                                      1. CFI Policy Violations
                                        1. Indirect Call Target Manipulation
                                          1. Virtual Function Exploitation
                                          2. Stack Protection Bypass
                                            1. Stack Canary Bypass
                                              1. Exception Handler Corruption
                                                1. Thread Local Storage Manipulation
                                              2. Sandbox Escape Techniques
                                                1. Kernel Exploitation
                                                  1. Kernel Vulnerability Discovery
                                                    1. Privilege Escalation Exploits
                                                      1. Kernel Address Space Layout Randomization Bypass
                                                      2. IPC Channel Abuse
                                                        1. Message Forgery
                                                          1. Deserialization Attacks
                                                            1. Broker Process Exploitation
                                                            2. Hardware Abstraction Layer Exploitation
                                                              1. Device Driver Vulnerabilities
                                                                1. Hardware Interface Abuse