Web Security Learning
stable

Content Index:

  • 1. Prologue
  • 2. Computer Networks and Protocols
  • 3. Information Collection
  • 4. Common vulnerability attack and defense
  • 5. Language and Framework
    • 5.1. PHP
    • 5.2. Python
    • 5.3. Java
    • 5.4. JavaScript
      • 5.4.1. ECMAScript
      • 5.4.2. Engine
      • 5.4.3. WebAssembly
      • 5.4.4. Scope and Closures
      • 5.4.5. Strict Mode
      • 5.4.6. Asynchronous Mechanisms
      • 5.4.7. Prototype chain
      • 5.4.8. Sandbox escape
      • 5.4.9. Deserialization
      • 5.4.10. jsfuck cheat sheet
      • 5.4.11. Trick
      • 5.4.12. Others
      • 5.4.13. Reference Links
    • 5.5. Golang
    • 5.6. Ruby
    • 5.7. ASP
    • 5.8. PowerShell
    • 5.9. Shell
    • 5.10. CSharp
  • 6. Intranet penetration
  • 7. Cloud Security
  • 8. Defense Technology
  • 9. Authentication Mechanism
  • 10. Tools and Resources
  • 11. Manual Quick Check
  • 12. Others
Web Security Learning
  • »
  • 5. Language and Framework »
  • 5.4. JavaScript »
  • 5.4.13. Reference Links

5.4.13. Reference LinksΒΆ

  • JavaScript Anti-Debugging Tips

  • ECMAScript Language Specification

  • js prototype

  • javascript anti-hijacking

  • XSS front-end firewall

  • exploiting node js deserialization bug for remote code execution

  • Prototype pollution attack Content released at NorthSec 2018 on prototype pollution

Previous Next

© Copyright 2019-2022, WebSecurity.

Built with Sphinx using a theme provided by Read the Docs.