Explore >> Select a destination


You are here

healeycodes.com
| | binarydebt.wordpress.com
4.2 parsecs away

Travel
| | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as...
| | blog.nelhage.com
3.5 parsecs away

Travel
| | CVE-2007-4573 is two years old at this point, but it remains one of my favorite vulnerabilities. It was a local privilege-escalation vulnerability on all x86_64 kernels prior to v2.6.22.7. It's very simple to understand with a little bit of background, and the exploit is super-simple, but it's still more interesting than Yet Another NULL Pointer Dereference. Plus, it was the first kernel bug I wrote an exploit for, which was fun.
| | cardaci.xyz
3.8 parsecs away

Travel
| | A subtlety of the ptrace system call can be used to prevent a program from being debugged on macOS.
| | www.thezdi.com
23.6 parsecs away

Travel
| [AI summary] A detailed review of the September 2021 security updates released by Adobe, Apple, Google Chrome, and Microsoft, analyzing specific vulnerability patches, severity ratings, and active exploits.