Browser Exploitation Foundations
JavaScript Engines, V8 Internals, Object Representation, JIT Compilation, Garbage Collection, Sandbox Architecture, and the Path to RCE
Exploitation, reverse engineering, and low-level internals. From userland to Ring -1.
JavaScript Engines, V8 Internals, Object Representation, JIT Compilation, Garbage Collection, Sandbox Architecture, and the Path to RCE
Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux
Understanding, Finding, and Exploiting Stack Buffer Overflows on x86-64 Linux
CPU Architecture, Registers, Virtual Memory, Process Layout, The Stack, The Heap, Calling Conventions, and Memory Protections
HTML/JS Context, Reflected, Stored, and DOM-Based XSS, Browser Parsing, Cookie Theft, and Defense Mechanisms
In-Band, Blind, Out-of-Band, Error-Based, Time-Based, Union-Based, Second-Order, and WAF Bypass Techniques
Breaking Single-Byte and Repeating-Key XOR, Stream Cipher Attacks, Nonce Reuse Exploitation, and One-Time Pad Theory
The Big Picture : Vocabulary, Concepts, and Building Blocks
Client-Server Architecture, DNS, Cookies, Sessions, Tokens, SOP, CORS, and the Browser Security Model
Understanding HTTP, Requests, Headers, and Mechanics of the Web