|
You are here |
github.com | ||
| | | | |
serverascode.com
|
|
| | | | | A techno-blog for our techno-times | |
| | | | |
sergioprado.blog
|
|
| | | | | In this article, we will learn how to debug the Linux kernel on an embedded Linux system with GDB. | |
| | | | |
xcellerator.github.io
|
|
| | | | | Learning about Linux rootkits is a great way to learn more about how the kernel works. What's great about it is that, unless you really understand what the kernel is doing, your rootkit is unlikely to work, so it serves as a fantasic verifier. In the FreeBSD world, you can find Joseph Kong's amazing book Designing BSD Rootkits. It was written in 2009, so is actually pretty outdated - which means that you have to do quite a bit of research to get the sample progras to work on modern FreeBSD. | |
| | | | |
syst3mfailure.io
|
|
| | | Wall of Perdition is the second and harder part of a two part series of kernel exploitation challenges designed by FizzBuzz101 and me for corCTF 2021. You can find the writeup for the first part, Fire of Salvation, on his blog. Unfortunately, both challenges during competition remained unsolved. Wall of Perdition consists of a vulnerable Linux Kernel Module, the bug is a 0x30 bytes Use After Free Write in kmalloc-64. With this challenge, we present a new approach to transform the Linux kernel's IPC mechanism, more specifically, message operations, in an exploitation toolkit. Let's get started! | ||