首页
社区
课程
招聘
[转帖][Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel
发表于: 2021-1-19 17:07 2151

[转帖][Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel

2021-1-19 17:07
2151

[Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel

Hi folks this blog post is part of a series in which I'm running through some of the  basics when it comes to kernel exploit development for Linux. I've started off the series with a walk through of how to setup your kernel for debugging and included a simple debug driver to target. The post here carries on from this point and explores some stack security paradigms in the kernel.


We're gonna add some stuff to that driver to make it do a dangerous memcpy and then look at whether we can manipulate memory structures with our input. I initially intended to cover full exploit to a root shell with this post but that proved a bit more challenging than I anticipated so I'm splitting this up into two posts. This one will cover almost everything right up to actually controlling the instruction pointer in the kernel and cover a good amount of detail on kernel memory protections for the stack and how they work. So if you'd like to learn more about that stay tuned!

https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html



[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 2
支持
分享
最新回复 (3)
雪    币: 2394
活跃值: (8795)
能力值: ( LV2,RANK:15 )
在线值:
发帖
回帖
粉丝
2
网页本地存档
https://fletime.lanzoux.com/iuE2kkks2fa
2021-1-19 17:19
0
雪    币: 98729
活跃值: (201034)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
3
FleTime 网页本地存档 https://fletime.lanzoux.com/iuE2kkks2fa
2021-1-19 17:19
0
雪    币: 3481
活跃值: (11143)
能力值: ( LV9,RANK:240 )
在线值:
发帖
回帖
粉丝
4
2021-1-19 17:28
0
游客
登录 | 注册 方可回帖
返回
//