Confirmed users
717
edits
No edit summary |
|||
Line 48: | Line 48: | ||
Attack vectors can be thought of in two ways: | Attack vectors can be thought of in two ways: | ||
* to enumerate what things could be used to attack the browser in the first place | * to enumerate what things could be used to attack the browser in the first place | ||
* once compromised, what assets does a process have | * once compromised, what assets does a process have to launch further attacks | ||
A very partial list of assets that could be considered attack vectors... please expand upon! | A very partial list of assets that could be considered attack vectors... please expand upon! |