|
You are here |
web.navan.dev | ||
| | | | |
www.davidxia.com
|
|
| | | | | My Hints and Solutions to the First Three Levels of Over the Wire Vortex December 25, 2020 | By David Xia I recently found more wargames at overthewire.org. ... | |
| | | | |
danielmangum.com
|
|
| | | | | Note: all analysis and code samples used in this post correspond to the v3.3.0 release of Zephyr. Having a good debugging workflow is critical to developing software quickly with high confidence. Fortunately, writing software for computers is often done, well, on a computer, meaning that while writing programs we can run other programs that help us understand the behavior of what we are writing. Typically the machine we are writing software for, though it may run in a data center and have a different for... | |
| | | | |
attilaolah.eu
|
|
| | | | | In this post I am going to demonstrate how to easily find out what an evilELF is doing to your system. This can be useful if you have one that... | |
| | | | |
pwning.systems
|
|
| | | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern... | ||