Introduction to Browser Exploitation
Introduction to web browser exploitation: how JavaScript engines work, Chrome's security architecture, and common vulnerabilities.
13 articles
Introduction to web browser exploitation: how JavaScript engines work, Chrome's security architecture, and common vulnerabilities.
Discover how to use Unicode characters in Burp Suite to bypass web application filters and improve your pentesting techniques.
Learn how to execute XSS by hosting malicious payloads in different types of DNS records such as MX, NS, CNAME, and TXT.
Learn how the Cross-site Request Forgery (CSRF) attack works, its conditions, practical exploitation examples, and main defenses like CSRF tokens and the SameSite attribute.
Detailed explanation of Cross-Origin Resource Sharing (CORS), its HTTP headers, functionality, and potential configuration vulnerabilities in web applications.
Complete guide to getting started in the bug bounty world, including platforms, tools, VPS, methodology, and tips for finding vulnerabilities.
Explanation of the Clickjacking attack (UI redressing), how it works through invisible iframes to trick users into performing unauthorized actions, and how to protect against it using X-Frame-Options and Content Security Policy.
Detailed explanation of the Same Origin Policy (SOP), the security policy implemented by browsers to prevent interaction between resources from different origins, including practical examples and exceptions.
Complete guide on SQL Injection: SQL fundamentals, types of injections (Union-based, Error-based, Boolean-based, Time-based), exploitation techniques, and practical examples with code.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏