Explore >> Select a destination


You are here

chovid99.github.io
| | albocoder.github.io
3.5 parsecs away

Travel
| | [AI summary] The text describes an exploit that leverages memory layout vulnerabilities in the Linux kernel. The attacker opens two files, maps them into memory, and uses a buffer overflow to overwrite the `f_mapping` field of a file structure. This allows the attacker to redirect file operations to a malicious location, potentially leading to privilege escalation.
| | gist.github.com
5.0 parsecs away

Travel
| | Disk speed test simulating CinePi. GitHub Gist: instantly share code, notes, and snippets.
| | xcellerator.github.io
5.1 parsecs away

Travel
| | In all the playing around I've been doing with Linux kernel modules, I decided to see what would happen if you tried to load one from a Docker container. It turns out that privileged containers (or just those with CAP_SYS_MODULE) are able to use the sys_init_module() and sys_finit_module() syscalls - which are what's used to load kernel modules. As all containers share their kernel with the host (unlike VMs), this clearly results in yet another complete system compromise.
| | hamatti.org
29.9 parsecs away

Travel
| Fluent Python is one of the best - if not the best - Python books and will help you become better at writing pythonic code.