|
You are here |
a13xp0p0v.tech | ||
| | | | |
blog.lexfo.fr
|
|
| | | | | ||
| | | | |
www.willsroot.io
|
|
| | | | | Vulnerability Research on Low-Level Systems | |
| | | | |
syst3mfailure.io
|
|
| | | | | Wall of Perdition is the second and harder part of a two part series of kernel exploitation challenges designed by FizzBuzz101 and me for corCTF 2021. You can find the writeup for the first part, Fire of Salvation, on his blog. Unfortunately, both challenges during competition remained unsolved. Wall of Perdition consists of a vulnerable Linux Kernel Module, the bug is a 0x30 bytes Use After Free Write in kmalloc-64. With this challenge, we present a new approach to transform the Linux kernel's IPC mechanism, more specifically, message operations, in an exploitation toolkit. Let's get started! | |
| | | | |
a13xp0p0v.github.io
|
|
| | | It's 2020. Quarantines are everywhere - and here I'm writing about one, too. But this quarantine is of a different kind. In this article I'll describe the Linux Kernel Heap Quarantine that I developed for mitigating kernel use-after-free exploitation. | ||