RET2 Browser Exploitation (2020)

RET2 Browser Exploitation (2020)
English | Tutorial | Size:



RET2 Browser Exploitation (2020)
Module 1 – Browser Architecture
Learn the architecture of Browser and JavaScript engines
Breaking down modern browser architectures, major components
Setting up a browser research environment, building, debugging
Introduction to JavaScript / DOM for Vulnerability Research
JavaScript + DOM interaction, “legacy” browser vulnerability patterns
JavaScript Engine Design
V8 (Chromium) and JavaScriptCore (WebKit) Engine Internals
JavaScript Garbage Collection
Module 2 – JavaScript Engine Vulnerabilities
Exploring V8 and JavaScriptCore engine internals
JavaScript Vulnerability Patterns
Anatomy of a JavaScript Engine Exploit
Building Arbitrary R/W Primitives from JS vulnerabilities
Building Arbitrary Code Execution Primitives
V8 and JSC JIT Overwrite Exercises
Module 3 – JavaScript Execution and JIT Compilation
Identify and exploit JIT based vulnerabilities
Overview of JIT compiler pipelines
JIT debugging and tools
Optimizations and typing
Type cache and speculation
Overwriting JIT structures
JIT vulnerability classes, contemporary exploits
Module 4 – Exploit Engineering
The exploit formula behind every browser vulnerability
Browser-Specific Exploit Mitigations
Renderer-Only Attacks (SOP Bypass)
Overview of Browser Sandboxing
Overview of Web-Browser Fuzzing Strategies
Chrome N-Day Exercise

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:

RAPIDGATOR:
rapidgator.net/file/3bfd564eeec4312677eed56459e86845/RET2_Browser_Exploitation.rar.html

TURBOBIT:
trbt.cc/72gc1sk8hock/RET2_Browser_Exploitation.rar.html

Leave a Comment