|
You are here |
chao-tic.github.io | ||
| | | | |
offlinemark.com
|
|
| | | | | This post details my adventures with the Linux virtual memory subsystem, and my discovery of a creative way to taunt the OOM (out of memory) killer by accumulating memory in the kernel, rather than in userspace. Keep reading and you'll learn: Internal details of the Linux kernel's demand paging implementation How to exploit virtual memory [...] | |
| | | | |
0x434b.dev
|
|
| | | | | Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example. | |
| | | | |
pwning.systems
|
|
| | | | | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern... | |
| | | | |
www.welivesecurity.com
|
|
| | | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful. | ||