Browser Exploitation Training
We are pleased to announce that the researchers of Exodus Intelligence will be providing publicly available training in person on November 14 2023 in London, England.
This 4 day course is designed to provide students with both an overview of the current state of the browser attack surface and an in-depth understanding of advanced vulnerability and exploitation topics. Attendees will be immersed in hands-on exercises that impart valuable skills including static and dynamic reverse engineering, zero-day vulnerability discovery, and advanced exploitation of widely deployed browsers such as Google Chrome and Apple Safari.
Taught by Senior members of the Exodus Intelligence Browser Research Team, this course provides students with direct access to our renowned professionals in a setting conducive to individual interactions.
- Computer with the ability to run a VirtualBox image (x64, recommended 1GB+ memory)
- Some familiarity with: IDA Pro, Python, C/C++.
- ASM fluency.
- Installed and usable copy of IDA Pro 6.1+, VirtualBox, Python 2.7+.
Attendance will be limited to 18 students per course.
Cost: $5000 USD per attendee
Dates: November 14-17, 2023
Location: the London, UK area
- Browsers Overview
- Introduction to Browser Exploitation
- Technical aspects and techniques of browser exploitation
- Chrome ArrayShift case study
- Safari NaN Speculation case study
- JIT Compilers in depth
- Chrome/V8 Turbofan
- Firefox/SpiderMonkey Ion
- Chrome ArrayShift case study exploitation
- Object in-memory layout
- Types of Arrays
- Chrome ArrayShift case study exploitation continued
- Garbage collection
- Running shellcode
- Common avenues
- Browser Fuzzing and Bug Hunting
- Introduction to fuzzing
- Pros and cons of fuzzing
- Fuzzing techniques for browsers
- “Smarter” fuzzing
- Current landscape
- Hands-on exercises throughout the course
- Understanding the environment and getting up to speed
- Analysis and exploitation of a vulnerability