Explore >> Select a destination


You are here

www.willsroot.io
| | docfate111.github.io
3.4 parsecs away

Travel
| | [AI summary] A detailed explanation of a Linux kernel vulnerability (CVE-2021-42327) in the GPU driver, involving a SLUB buffer overflow that allows privilege escalation and arbitrary code execution through exploitation techniques like heap spraying and KASLR bypass.
| | klecko.github.io
3.8 parsecs away

Travel
| | Last month Blue Frost Security published two exploitation challenges for Ekoparty 2022. One of them was a Linux kernel challenge. I don't have much experience with Linux kernel exploitation, so this was a good opportunity to practise. I also write this up as a reference for my future self.
| | syst3mfailure.io
1.4 parsecs away

Travel
| | Wall of Perdition is the second and harder part of a two part series of kernel exploitation challenges designed by FizzBuzz101 and me for corCTF 2021. You can find the writeup for the first part, Fire of Salvation, on his blog. Unfortunately, both challenges during competition remained unsolved. Wall of Perdition consists of a vulnerable Linux Kernel Module, the bug is a 0x30 bytes Use After Free Write in kmalloc-64. With this challenge, we present a new approach to transform the Linux kernel's IPC mechanism, more specifically, message operations, in an exploitation toolkit. Let's get started!
| | blog.acrossecurity.com
24.1 parsecs away

Travel
| O r Maybe Both? This post was inspired by a recent ZDNET article "Offensive security research community helping bad guys" and this Threa...