Explore >> Select a destination


You are here

blog.frizk.net
| | manybutfinite.com
3.5 parsecs away

Travel
| | After examining the virtual address layout of a process, we turn to the kernel and its mechanisms for managing user memory. Here is gonzo again: Linux processes are implemented in the kernel as insta
| | github.blog
3.6 parsecs away

Travel
| | In this post Ill exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights the strong primitives that an attacker may gain by exploiting errors in the memory management code of GPU drivers.
| | www.internalpointers.com
4.6 parsecs away

Travel
| | ...and the crucial role it plays in modern operating systems.
| | pwning.systems
16.1 parsecs away

Travel
| Following up on my first blog post, I've received a few requests to write about setting up a debugging environment; however, since everybody uses different emulators and so on, I'll mainly focus on which config options are useful! You must first obtain the kernel sources for your preferred version before you can set up a kernel suitable for debugging. We'll have to decompress it after that. # use your preferred version $ wget https://git.