Explore >> Select a destination


You are here

0x434b.dev
| | manybutfinite.com
4.4 parsecs away

Travel
| | After examining the virtual address layout of a process, we turn to the kernel and its mechanisms for managing user memory. Here is gonzo again: Linux processes are implemented in the kernel as insta
| | klecko.github.io
2.2 parsecs away

Travel
| | Last month Blue Frost Security published two exploitation challenges for Ekoparty 2022. One of them was a Linux kernel challenge. I don't have much experience with Linux kernel exploitation, so this was a good opportunity to practise. I also write this up as a reference for my future self.
| | blog.lexfo.fr
4.2 parsecs away

Travel
| | The first article covers an in-depth CVE/bug analysis, designs an attack scenario and starts implementing a PoC in ring-0 with SystemTap. The core concept section focuses on file/socket related data structures, netlink and refcounters.
| | www.huntress.com
28.9 parsecs away

Travel
| Huntress has observed threat actors exploiting a Microsoft Windows Server Update Services (WSUS) vulnerability (CVE-2025-59287).