Exploitation Learning Linux kernel exploitation - Part 2 - CVE-2022-0847 Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example.
Exploitation Learning Linux kernel exploitation - Part 1 - Laying the groundwork Table fo contents Disclaimer: This post will cover basic steps to accomplish a privilege escalation based on a vulnerable driver. The basis for this introduction will be a challenge from the hxp2020 CTF called "kernel-rop". There's (obviously) write-ups for this floating around the net (check references)
RE Reversing and Exploiting Dr. von Noizemans Nuclear Bomb Note: Re-upload due to dead links :) Yo! Life kept me more than busy, but now I've got a little more time on my hands. I decided to do a write up on the following binary, because it taught me some new things, compared to the easy reversemes I
Exploitation Exploit Mitigation Techniques - Part 3 - Address Space Layout Randomization (ASLR) Preface Hey there! I'm finally ready to present you the third installment of the series exploit mitigation techniques. The last two times we talked about Data Execution Prevention and Stack Canaries. Today I want to talk about Address Space Layout Randomization or ASLR in short. Format wise the
Exploitation Exploit Mitigation Techniques - Part 2 - Stack Canaries Preface Hey there! After quite some time the second part will be finally published :) ! Sorry for the delay, real life can be overwhelming.. Last time I have introduced this series by covering Data Execution Prevention (DEP). Today we're dealing with the next big technique. As the title already
Exploitation Exploit Mitigation Techniques - Part 1 - Data Execution Prevention (DEP) Preface Welcome to a new series about GNU/Linux exploit mitigation techniques. I want to shift the focus to the bypassed techniques to create a series about currently deployed approaches. Afterwards, I'd like to focus on their limitations with a follow up on how to bypass them with
Exploitation An introduction to printer exploitation Preface Note: As always the following is just a digest of all the things I could observe by working on printers myself or facts from stuff I read about recently. Since this thread about the HP printer promo videos caught some attention I will try to shed some light onto