Useful Links
Computer Science
Cybersecurity
Browser Security and Exploitation
1. Introduction to Browser Security
2. Browser Architecture Fundamentals
3. Web Technology Foundations
4. Browser Security Models
5. Vulnerability Classifications
6. Browser Exploitation Methodology
7. Exploitation Primitives and Techniques
8. JavaScript Engine Exploitation
9. DOM and Rendering Engine Exploitation
10. Browser Hardening and Mitigations
11. Vulnerability Research Methods
12. Browser Extensions and Plugin Security
13. Emerging Attack Surfaces
14. Security Analysis Tools
Browser Exploitation Methodology
Initial Code Execution
Vulnerability Triggering
Input Vector Identification
Exploit Payload Delivery
Reliability Improvement
Control Flow Hijacking
Instruction Pointer Control
Return Address Overwrite
Virtual Function Table Corruption
Shellcode Execution
Shellcode Development
Payload Encoding
Environment Constraints
Mitigation Bypass Techniques
Address Space Layout Randomization Bypass
Information Leak Exploitation
Heap Spray Techniques
Partial ASLR Bypass
Data Execution Prevention Bypass
Return-Oriented Programming
Jump-Oriented Programming
JIT Code Reuse
Control Flow Integrity Bypass
CFI Policy Violations
Indirect Call Target Manipulation
Virtual Function Exploitation
Stack Protection Bypass
Stack Canary Bypass
Exception Handler Corruption
Thread Local Storage Manipulation
Sandbox Escape Techniques
Kernel Exploitation
Kernel Vulnerability Discovery
Privilege Escalation Exploits
Kernel Address Space Layout Randomization Bypass
IPC Channel Abuse
Message Forgery
Deserialization Attacks
Broker Process Exploitation
Hardware Abstraction Layer Exploitation
Device Driver Vulnerabilities
Hardware Interface Abuse
Previous
5. Vulnerability Classifications
Go to top
Next
7. Exploitation Primitives and Techniques