Explore >> Select a destination


You are here

chao-tic.github.io
| | manybutfinite.com
3.2 parsecs away

Travel
| | After examining the virtual address layout of a process, we turn to the kernel and its mechanisms for managing user memory. Here is gonzo again: Linux processes are implemented in the kernel as insta
| | pwning.systems
3.3 parsecs away

Travel
| | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern...
| | 0x434b.dev
1.6 parsecs away

Travel
| | Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example.
| | www.tyil.nl
17.7 parsecs away

Travel
| [AI summary] A step-by-step tutorial on configuring nginx with Let's Encrypt SSL certificates on a FreeBSD server to enable secure HTTPS hosting.