|
You are here |
mdanilor.github.io | ||
| | | | |
xcellerator.github.io
|
|
| | | | | Now that you know how to make a Linux kernel module that can hook any exposed function in kernel memory (Part 1 and Part 2), let's get down to writing a hook that does something interesting! In this first example, we're going to make a rootkit that intercepts calls to sys_kill. 99% of the time, we only use sys_kill (the userspace tool we normally use is the familiar kill) to kill a process, i. | |
| | | | |
www.sektioneins.de
|
|
| | | | | The DYLD_PRINT_TO_FILE environment variable can be used for local privilege escalation in OS X Yosemite. blockquote p, blockquote {font-family: monospace; font-size: 14px;} #imgtc {float: right; mar | |
| | | | |
pwning.systems
|
|
| | | | | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern... | |
| | | | |
chovid99.github.io
|
|
| | | Security's blog made by Chovid99 | ||