From 05e60b9cef9b4e08e69b7dbbb620fe0e532e3d23 Mon Sep 17 00:00:00 2001 From: Jack Ren Date: Mon, 16 Sep 2024 18:58:33 +0800 Subject: [PATCH] Modified README.md for Level 6 of PwnCollegeV8Exploitation --- JavaScript/PwnCollegeV8Exploitation/Level6/README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/JavaScript/PwnCollegeV8Exploitation/Level6/README.md b/JavaScript/PwnCollegeV8Exploitation/Level6/README.md index 6ac5af7..bcbdce4 100644 --- a/JavaScript/PwnCollegeV8Exploitation/Level6/README.md +++ b/JavaScript/PwnCollegeV8Exploitation/Level6/README.md @@ -18,3 +18,6 @@ Given a vulnerable builtin `Array.prototype.functionMap(func)`: - [Attacking Client-Side JIT Compilers (v2)](https://saelo.github.io/presentations/blackhat_us_18_attacking_client_side_jit_compilers.pdf#page=106) - [Pwn2Own 2018 CVE-2018-4233 分析](https://www.anquanke.com/post/id/244472) - Use this technique to construct Address Of & Fake Object primitive. +- How to build d8 and debug them? + - [Building V8 from source](https://v8.dev/docs/build) + - [Building V8 with GN](https://v8.dev/docs/build-gn)