首页
社区
课程
招聘
[转帖][Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel
发表于: 2021-1-19 17:07 2116

[转帖][Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel

2021-1-19 17:07
2116

[Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel

Hi folks this blog post is part of a series in which I'm running through some of the  basics when it comes to kernel exploit development for Linux. I've started off the series with a walk through of how to setup your kernel for debugging and included a simple debug driver to target. The post here carries on from this point and explores some stack security paradigms in the kernel.


We're gonna add some stuff to that driver to make it do a dangerous memcpy and then look at whether we can manipulate memory structures with our input. I initially intended to cover full exploit to a root shell with this post but that proved a bit more challenging than I anticipated so I'm splitting this up into two posts. This one will cover almost everything right up to actually controlling the instruction pointer in the kernel and cover a good amount of detail on kernel memory protections for the stack and how they work. So if you'd like to learn more about that stay tuned!

https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html



[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

收藏
免费 2
支持
分享
最新回复 (3)
雪    币: 2311
活跃值: (8720)
能力值: ( LV2,RANK:15 )
在线值:
发帖
回帖
粉丝
2
网页本地存档
https://fletime.lanzoux.com/iuE2kkks2fa
2021-1-19 17:19
0
雪    币: 97697
活跃值: (200824)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
3
FleTime 网页本地存档 https://fletime.lanzoux.com/iuE2kkks2fa
2021-1-19 17:19
0
雪    币: 3352
活跃值: (10987)
能力值: ( LV9,RANK:240 )
在线值:
发帖
回帖
粉丝
4
2021-1-19 17:28
0
游客
登录 | 注册 方可回帖
返回
//