Web Security Learning
stable

Content Index:

  • 1. Prologue
  • 2. Computer Networks and Protocols
  • 3. Information Collection
  • 4. Common vulnerability attack and defense
  • 5. Language and Framework
    • 5.1. PHP
    • 5.2. Python
    • 5.3. Java
    • 5.4. JavaScript
      • 5.4.1. ECMAScript
      • 5.4.2. Engine
      • 5.4.3. WebAssembly
      • 5.4.4. Scope and Closures
      • 5.4.5. Strict Mode
      • 5.4.6. Asynchronous Mechanisms
      • 5.4.7. Prototype chain
      • 5.4.8. Sandbox escape
      • 5.4.9. Deserialization
      • 5.4.10. jsfuck cheat sheet
      • 5.4.11. Trick
      • 5.4.12. Others
      • 5.4.13. Reference Links
    • 5.5. Golang
    • 5.6. Ruby
    • 5.7. ASP
    • 5.8. PowerShell
    • 5.9. Shell
    • 5.10. CSharp
  • 6. Intranet penetration
  • 7. Cloud Security
  • 8. Defense Technology
  • 9. Authentication Mechanism
  • 10. Tools and Resources
  • 11. Manual Quick Check
  • 12. Others
Web Security Learning
  • »
  • 5. Language and Framework »
  • 5.4. JavaScript

5.4. JavaScriptΒΆ

Content Index:

  • 5.4.1. ECMAScript
    • 5.4.1.1. Introduction
    • 5.4.1.2. Version
    • 5.4.1.3. ES6 Features
  • 5.4.2. Engine
    • 5.4.2.1. V8
    • 5.4.2.2. SpiderMonkey
    • 5.4.2.3. JavaScriptCore
    • 5.4.2.4. ChakraCore
    • 5.4.2.5. JScript
    • 5.4.2.6. JerryScript
  • 5.4.3. WebAssembly
    • 5.4.3.1. Introduction
    • 5.4.3.2. Execution
    • 5.4.3.3. Security
  • 5.4.4. Scope and Closures
    • 5.4.4.1. Scope and scope chains
    • 5.4.4.2. Closures
    • 5.4.4.3. Global Objects
  • 5.4.5. Strict Mode
    • 5.4.5.1. Introduction
    • 5.4.5.2. Invocation
    • 5.4.5.3. Behavior change
  • 5.4.6. Asynchronous Mechanisms
    • 5.4.6.1. async / await
    • 5.4.6.2. Promise
    • 5.4.6.3. Execution queue
  • 5.4.7. Prototype chain
    • 5.4.7.1. Explicit and Implicit Prototypes
    • 5.4.7.2. The new process
    • 5.4.7.3. Examples
    • 5.4.7.4. Prototype chain pollution
  • 5.4.8. Sandbox escape
    • 5.4.8.1. Frontend Sandbox
    • 5.4.8.2. Server Sandbox
  • 5.4.9. Deserialization
    • 5.4.9.1. Introduction
    • 5.4.9.2. Payload Construction
    • 5.4.9.3. Payload Construction II
  • 5.4.10. jsfuck cheat sheet
    • 5.4.10.1. Basic values
    • 5.4.10.2. Basic strings
    • 5.4.10.3. Higher numbers
    • 5.4.10.4. String alphabet
  • 5.4.11. Trick
    • 5.4.11.1. Constructing specific characters from regular expressions
  • 5.4.12. Others
    • 5.4.12.1. Command execution
    • 5.4.12.2. Anti-Debugging Techniques
    • 5.4.12.3. Object Copy
    • 5.4.12.4. Common Sink
  • 5.4.13. Reference Links
Previous Next

© Copyright 2019-2022, WebSecurity.

Built with Sphinx using a theme provided by Read the Docs.