|
You are here |
pwning.systems | ||
| | | | |
lkmidas.github.io
|
|
| | | | | A popular and powerful technique to exploit the Linux kernel through modprobe_path | |
| | | | |
blog.infosectcbr.com.au
|
|
| | | | | Dr Silvio Cesare @silviocesare Summary In this blog post I'll discuss how to exploit the Linux kernel via a stack smashing... | |
| | | | |
exploiter.dev
|
|
| | | | | FUSE for Linux Exploitation 101 | |
| | | | |
blog.oddbit.com
|
|
| | | Overview I was recently working with someone else's C source and I wanted to add some basic error checking without mucking up the code with a bunch of if statements and calls to perror. I ended up implementing a simple must function that checks the return value of an expression, and exits with an error if the return value is less than 0. You use it like this: must(fd = open("textfile.txt", O_RDONLY)); Or: | ||