|
You are here |
chovid99.github.io | ||
| | | | |
albocoder.github.io
|
|
| | | | | [AI summary] The text describes an exploit that leverages memory layout vulnerabilities in the Linux kernel. The attacker opens two files, maps them into memory, and uses a buffer overflow to overwrite the `f_mapping` field of a file structure. This allows the attacker to redirect file operations to a malicious location, potentially leading to privilege escalation. | |
| | | | |
gist.github.com
|
|
| | | | | Disk speed test simulating CinePi. GitHub Gist: instantly share code, notes, and snippets. | |
| | | | |
xcellerator.github.io
|
|
| | | | | In all the playing around I've been doing with Linux kernel modules, I decided to see what would happen if you tried to load one from a Docker container. It turns out that privileged containers (or just those with CAP_SYS_MODULE) are able to use the sys_init_module() and sys_finit_module() syscalls - which are what's used to load kernel modules. As all containers share their kernel with the host (unlike VMs), this clearly results in yet another complete system compromise. | |
| | | | |
hamatti.org
|
|
| | | Fluent Python is one of the best - if not the best - Python books and will help you become better at writing pythonic code. | ||