Exploitation Learning Linux kernel exploitation - Part 2 - CVE-2022-0847 Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example. By 0x434b 9 May 2022
Exploitation Learning Linux kernel exploitation - Part 1 - Laying the groundwork Table fo contents Disclaimer: This post will cover basic steps to accomplish a privilege escalation based on a vulnerable driver. The basis for this introduction By 0x434b 1 Mar 2022
RE Reversing and Exploiting Dr. von Noizemans Nuclear Bomb Note: Re-upload due to dead links :) Yo! Life kept me more than busy, but now I've got a little more time on my By 0x434b 10 Jul 2020
Exploitation Exploit Mitigation Techniques - Part 2 - Stack Canaries Preface Hey there! After quite some time the second part will be finally published :) ! Sorry for the delay, real life can be overwhelming.. Last time By 0x434b 4 May 2020
Exploitation Exploit Mitigation Techniques - Part 3 - Address Space Layout Randomization (ASLR) Preface Hey there! I'm finally ready to present you the third installment of the series exploit mitigation techniques. The last two times we By 0x434b 4 May 2020
Exploitation Exploit Mitigation Techniques - Part 1 - Data Execution Prevention (DEP) Preface Welcome to a new series about GNU/Linux exploit mitigation techniques. I want to shift the focus to the bypassed techniques to create a By 0x434b 4 May 2020
Exploitation An introduction to printer exploitation Preface Note: As always the following is just a digest of all the things I could observe by working on printers myself or facts from By 0x434b 4 May 2020