Browser Security and Exploitation

  1. Exploitation Primitives and Techniques
    1. Heap Manipulation
      1. Heap Spraying
        1. Memory Layout Control
          1. Exploit Reliability Enhancement
            1. Heap Spray Detection Evasion
            2. Heap Grooming
              1. Heap Layout Shaping
                1. Object Placement Control
                  1. Fragmentation Management
                  2. Heap Overflow Exploitation
                    1. Metadata Corruption
                      1. Function Pointer Overwrite
                        1. Virtual Table Corruption
                      2. Code Reuse Attacks
                        1. Return-Oriented Programming
                          1. Gadget Discovery
                            1. ROP Chain Construction
                              1. Stack Pivot Techniques
                              2. Jump-Oriented Programming
                                1. JOP Gadget Identification
                                  1. Dispatcher Gadget Usage
                                    1. JOP Chain Assembly
                                    2. JIT Code Reuse
                                      1. JIT Spray Techniques
                                        1. JIT Code Layout Prediction
                                          1. Dynamic Code Generation Abuse
                                        2. Primitive Construction
                                          1. Address Leak Primitives
                                            1. Object Address Disclosure
                                              1. Function Pointer Leakage
                                                1. Stack Address Revelation
                                                2. Arbitrary Read Primitives
                                                  1. Memory Content Disclosure
                                                    1. Pointer Following
                                                      1. Type Confusion Exploitation
                                                      2. Arbitrary Write Primitives
                                                        1. Memory Corruption Techniques
                                                          1. Object Property Manipulation
                                                            1. Function Pointer Overwrite