|
You are here |
healeycodes.com | ||
| | | | |
cardaci.xyz
|
|
| | | | | A subtlety of the ptrace system call can be used to prevent a program from being debugged on macOS. | |
| | | | |
binarydebt.wordpress.com
|
|
| | | | | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as... | |
| | | | |
blog.nelhage.com
|
|
| | | | | CVE-2007-4573 is two years old at this point, but it remains one of my favorite vulnerabilities. It was a local privilege-escalation vulnerability on all x86_64 kernels prior to v2.6.22.7. It's very simple to understand with a little bit of background, and the exploit is super-simple, but it's still more interesting than Yet Another NULL Pointer Dereference. Plus, it was the first kernel bug I wrote an exploit for, which was fun. | |
| | | | |
thehackernews.com
|
|
| | | Beware! Kinsing cryptojacking attacks are targeting Kubernetes clusters through misconfigured PostgreSQL. | ||