The document defines several JavaScript concepts including classes, inheritance, and object-oriented programming principles. It defines an Animal class that is extended by a Snake class which overrides the move method. It also defines SceneMain class that extends an enchant.Scene class, a constructor function, and a Hoge class with a getter method to return the name property.
Find Blue Oceans - Through the Competitive World of Bug BountyMuneaki Nishimura
?
This document discusses tips for finding uncontested bug bounty targets from a bug hunter's experience with Mozilla Firefox. Some key tips include searching for bugs in web platforms, unstable features in development builds, and sub-products like Firefox for Android and Firefox for iOS in order to find less competitive targets. Examples are provided of successful bounties collected from bugs found in areas like the Firefox OS, Firefox for iOS internal pages, and Android intent handling.
This document discusses techniques for intercepting and analyzing HTTPS traffic, including using a custom HTTPS proxy called Proxy2. Key points:
- Proxy2 is a Python HTTPS proxy that can trace, modify, and save HTTPS payloads without user interaction. It works by installing a private CA certificate, decrypting traffic.
- The proxy prints colored headers and POST data by default. It can change user-agents and rewrite request paths.
- While useful for developers and security, installing private CAs opens risks if they become compromised, as with preinstalled CAs like Superfish. End-to-end encryption provides better security.
- Other tools like Fiddler require user interaction, while Proxy2 allows
Using JavaScript ES2015 (ES6), ES2016, ES2017 in productionAn?e ?nidar?i?
?
This document summarizes the history and new features of JavaScript ES2015 and later versions. It discusses features added in ES2015 like block scope variables, arrow functions, classes, string literals and modules. It also covers browser support for ES2015 and tools like Babel that can transpile newer JavaScript to older versions. The document provides an overview of their development workflow using technologies like Gulp, Babel, Ansible and Livereload. It briefly mentions new features in ES2016 like exponentiation operator and Array.includes and async functions in ES2017.
This document provides information about APIs available on Mozilla Firefox OS, including the Device Storage API, Camera API, and FM Radio API.
The Device Storage API allows accessing storage on the device like the SD card. It provides methods to get, add, delete and enumerate files. The Camera API gives access to device cameras and controls like taking pictures and video. It provides options for resolution, effects and more. The FM Radio API allows controlling the FM radio on supported devices by setting the frequency and checking antenna availability.
Bypass SOP, Theft Your Data - XSS Allstars from Japan / OWASP AppSec APAC 2014Yosuke HASEGAWA
?
1) Modern versions of Internet Explorer have vulnerabilities that allow bypassing the same-origin policy and disclosing cross-origin information through VBScript error messages or the Tabular Data Control ActiveX object.
2) An attacker can trigger VBScript errors that include sensitive JSON data or access a text file bound to a TDC object to exfiltrate secrets.
3) Countermeasures include adding X-Content-Type-Options headers, restricting XMLHttpRequests by a custom header, and not allowing external data to be placed at the top of response content.
This document provides instructions on how to use Perl on Windows and call functions between Perl and x86 code. It discusses using ActivePerl to run Perl on Windows, calling DLL functions from Perl using Win32::API, calling x86 code from Perl using signal handlers, and calling Perl subs from x86 code. Examples are provided for each technique.