|
You are here |
www.cyberdemon.org | ||
| | | | |
blog.marbu.eu
|
|
| | | | | [AI summary] The article discusses the implementation and implications of the birth time (btime) timestamp in Linux, highlighting its limited support in tools and the lack of standardization. It explores use cases like forensic analysis and data hiding, and references related resources. | |
| | | | |
www.anmolsarma.in
|
|
| | | | | The stat utility can be used to retrieve the Unix file timestamps namely atime, ctime and mtime. Of these, the benefit of mtime which records the last time when the file was modified is immediately apparent. On the other hand, atime1 which records the last time the file was accessed has been called "perhaps the most stupid Unix design idea of all times". Intuitively, one might expect ctime to record the creation time of a file. | |
| | | | |
blog.carlosgaldino.com
|
|
| | | | | A file system is responsible for organising and providing an abstraction over the storage devices where the data is physically stored. In this post, we will learn more about the concepts used by file systems, and how they fit together when writing your own. | |
| | | | |
pwning.systems
|
|
| | | The following are some of the bugs I discovered: 2022 CVE-2022-26743: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.4. An attacker that has already achieved code execution in macOS Recovery may be able to escalate to kernel privileges. - Self note: This was both a write and a read of a user controlled size at a user controlled offset. | ||