|
You are here |
exploiter.dev | ||
| | | | |
blog.infosectcbr.com.au
|
|
| | | | | Dr Silvio Cesare@silviocesare Summary In this blog post I'll discuss how to exploit the Linux kernel via a stack smashing attack. I'll be attacking the latest kernel version. I'll also introduce a vulnerable device driver that I wrote so that I can focus on the exploitation development and not the vulnerability research. A number of... | |
| | | | |
pwning.systems
|
|
| | | | | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern... | |
| | | | |
blog.infosectcbr.com.au
|
|
| | | | | Dr Silvio Cesare @silviocesare Summary In this blog post I'll discuss how to exploit the Linux kernel via a stack smashing... | |
| | | | |
blog.trailofbits.com
|
|
| | | At DEF CON, Michael Brown, Principal Security Engineer at Trail of Bits, sat down with Michael Novinson from Information Security Media Group (ISMG) to discuss four critical areas where AI/ML is revolutionizing security. Here's what they covered: AI/ML techniques surpass the limits of traditional software analysis As Moore's law slows down after 20 years of... | ||