Modern web browsers pose a challenging and attractive target for security researchers. However, with ever growing codebases and increasing code complexity, the barrier to entry for security research in this area has been rising as well. This training is designed to prepare students for a successful entry into this field. Students will learn to identify, analyze, and exploit vulnerabilities in the context of a renderer process. Through various hands-on exercises, students get practical experience and gain a good understanding of the respective code bases. Excercises will be designed for Chrome and Firefox, although most of them can also be completed on Edge and/or Safari.
The training will roughly be divided into two parts: the first part provides an in-depth introduction to web browser internals (such as the DOM and JavaScript engines) with a focus on security relevant components. The second part of the training will then focus on identifying and exploiting vulnerabilities in the renderer process, and where to go from there. On the last day there will also be a CTF-style event in which students go all the way from auditing a small browser component to writing a reliable exploit and gaining code execution inside the renderer process.
While no previous experience with browser internals is required, students should be moderately familiar with memory corruption exploitation, low-level process internals, common debuggers, and C++. For students that do not wish to install compiler toolchains etc. directly on their laptop, Linux-based virtual machine images for Firefox and Chrome will be provided.
Students should
Samuel is a Master’s student at Karlsruhe Institute of Technology and security researcher in his spare time. He has been researching browser security for some years now and has published multiple articles on the subject, including a Phrack paper on JavaScriptCore (the JavaScript engine inside WebKit/Safari) exploitation. In 2017 he partnered with Niklas Baumstark to compete in the pwn2own competition and the team succeeded in remotely exploiting Safari and subsequently gaining root access to the underlying macOS system.
Samuel Groß