|
You are here |
googleprojectzero.blogspot.com | ||
| | | | |
www.willsroot.io
|
|
| | | | | Vulnerability Research on Low-Level Systems | |
| | | | |
a13xp0p0v.tech
|
|
| | | | | CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. I discovered and fixed them in January 2021. In this article I describe how to exploit them for local privilege escalation on Fedora 33 Server for x86_64, bypassing SMEP and SMAP. | |
| | | | |
a13xp0p0v.tech
|
|
| | | | | This article discloses the exploitation of CVE-2017-2636, which is a race condition in the n_hdlc Linux kernel driver. My PoC exploit for x86_64 gains root privileges bypassing Supervisor Mode Execution Protection (SMEP). | |
| | | | |
pwning.systems
|
|
| | | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern... | ||