Explore >> Select a destination


You are here

chao-tic.github.io
| | offlinemark.com
12.4 parsecs away

Travel
| | This post details my adventures with the Linux virtual memory subsystem, and my discovery of a creative way to taunt the OOM (out of memory) killer by accumulating memory in the kernel, rather than in userspace. Keep reading and you'll learn: Internal details of the Linux kernel's demand paging implementation How to exploit virtual memory [...]
| | 0x434b.dev
6.2 parsecs away

Travel
| | Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example.
| | pwning.systems
12.9 parsecs away

Travel
| | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern...
| | www.welivesecurity.com
53.2 parsecs away

Travel
| ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful.