Useful Links
Computer Science
Cybersecurity
Browser Security and Exploitation
1. Introduction to Browser Security
2. Browser Architecture Fundamentals
3. Web Technology Foundations
4. Browser Security Models
5. Vulnerability Classifications
6. Browser Exploitation Methodology
7. Exploitation Primitives and Techniques
8. JavaScript Engine Exploitation
9. DOM and Rendering Engine Exploitation
10. Browser Hardening and Mitigations
11. Vulnerability Research Methods
12. Browser Extensions and Plugin Security
13. Emerging Attack Surfaces
14. Security Analysis Tools
Exploitation Primitives and Techniques
Heap Manipulation
Heap Spraying
Memory Layout Control
Exploit Reliability Enhancement
Heap Spray Detection Evasion
Heap Grooming
Heap Layout Shaping
Object Placement Control
Fragmentation Management
Heap Overflow Exploitation
Metadata Corruption
Function Pointer Overwrite
Virtual Table Corruption
Code Reuse Attacks
Return-Oriented Programming
Gadget Discovery
ROP Chain Construction
Stack Pivot Techniques
Jump-Oriented Programming
JOP Gadget Identification
Dispatcher Gadget Usage
JOP Chain Assembly
JIT Code Reuse
JIT Spray Techniques
JIT Code Layout Prediction
Dynamic Code Generation Abuse
Primitive Construction
Address Leak Primitives
Object Address Disclosure
Function Pointer Leakage
Stack Address Revelation
Arbitrary Read Primitives
Memory Content Disclosure
Pointer Following
Type Confusion Exploitation
Arbitrary Write Primitives
Memory Corruption Techniques
Object Property Manipulation
Function Pointer Overwrite
Previous
6. Browser Exploitation Methodology
Go to top
Next
8. JavaScript Engine Exploitation