Explore >> Select a destination


You are here

mdanilor.github.io
| | mutur4.github.io
1.7 parsecs away

Travel
| | This blog post will cover the exploitation of vulnerable a Linux Kernel Driver by chaining a Heap Overflow bug with a 'sandboxed' Arbitrary Address Write (AAW) for Local Priviledge Escalation to root by overwriting core_pattern with most mitigations enabled.
| | mutur4.github.io
1.1 parsecs away

Travel
| | In the Linux Kernel 'ring (0)' a stack is also allocated for local variables defined in functions. These functions are mainly implemented for device drivers that are defined in different Loadable Kernel Modules (LKMs). The same stack is also vulnerable to stack overflow attacks that aim at overwriting the return address saved on the stack - this post will cover exploiting these vulnerabilities.
| | blog.infosectcbr.com.au
0.8 parsecs away

Travel
| | Dr Silvio Cesare @silviocesare Summary In this blog post I'll discuss how to exploit the Linux kernel via a stack smashing...
| | googleprojectzero.blogspot.com
15.5 parsecs away

Travel
| Guest blog post, posted by Andrey Konovalov Introduction Lately I've been spending some time fuzzing network-related Linux kernel int...