Explore >> Select a destination


You are here

www.hackthebox.com
| | syst3mfailure.io
1.9 parsecs away

Travel
| | Wall of Perdition is the second and harder part of a two part series of kernel exploitation challenges designed by FizzBuzz101 and me for corCTF 2021. You can find the writeup for the first part, Fire of Salvation, on his blog. Unfortunately, both challenges during competition remained unsolved. Wall of Perdition consists of a vulnerable Linux Kernel Module, the bug is a 0x30 bytes Use After Free Write in kmalloc-64. With this challenge, we present a new approach to transform the Linux kernel's IPC mechanism, more specifically, message operations, in an exploitation toolkit. Let's get started!
| | pwning.systems
2.2 parsecs away

Travel
| | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern...
| | mutur4.github.io
2.0 parsecs away

Travel
| | In the Linux Kernel 'ring (0)' a stack is also allocated for local variables defined in functions. These functions are mainly implemented for device drivers that are defined in different Loadable Kernel Modules (LKMs). The same stack is also vulnerable to stack overflow attacks that aim at overwriting the return address saved on the stack - this post will cover exploiting these vulnerabilities.
| | www.github.com
12.9 parsecs away

Travel
| my blog, with astro. Contribute to Krayorn/blog development by creating an account on GitHub.