Explore >> Select a destination


You are here

blog.lizzie.io
| | blog.quarkslab.com
2.5 parsecs away

Travel
| | [AI summary] The provided text discusses the use of Linux namespaces to isolate network stacks, enabling the creation of isolated environments for processes. It covers topics such as network namespaces, virtual interfaces, bridges, and iptables rules to enable communication between namespaces and the outside world. The text also touches on other namespaces like USER, MNT, UTS, IPC, and CGROUP, and references various resources for further reading.
| | 0x434b.dev
5.0 parsecs away

Travel
| | Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example.
| | outflux.net
3.4 parsecs away

Travel
| | [AI summary] The provided text is a collection of blog posts and technical notes from a developer or system administrator, covering various Linux-related topics such as ASLR configuration in GDB, process monitoring tools, security practices, and discussions on system vulnerabilities and exploits. The content includes code snippets, explanations of Linux kernel behaviors, and insights into software development and system administration practices.
| | reverse.put.as
7.2 parsecs away

Travel
| This is a guest post by a young and talented Portuguese exploiter, Federico Bento. He won this year's Pwnie for Epic Achievement exploiting TIOCSTI ioctl. Days ago he posted a video demonstrating an exploit for CVE-2017-5123 and luckly for you I managed to convince him to do a write-up about it. I hope you enjoy his work. Thanks Federico!