|
You are here |
xcellerator.github.io | ||
| | | | |
pwning.systems
|
|
| | | | | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern... | |
| | | | |
sookocheff.com
|
|
| | | | | A short tagline from the book Learning eBPF describes eBPF as a revolutionary kernel technology that allows developers to write custom code that can be loaded into the kernel dynamically, changing the way the kernel behaves. The key word in this phrase is dynamically. eBPF allows you to write custom code that changes the way the kernel behaves without having to implement a kernel module or integrate your code directly into the kernel. | |
| | | | |
debugging.works
|
|
| | | | | describes how to debug a Linux Kernel Module | |
| | | | |
benrutter.codeberg.page
|
|
| | | |||