- Notifications
You must be signed in to change notification settings - Fork37
Linux Kernel exploitation Tutorial.
License
NotificationsYou must be signed in to change notification settings
Lazenca/Kernel-exploit-tech
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
Hi, I am Lazneca.0x0
These files are the example files used at "https://www.lazenca.net/display/TEC/07.Linux+Kernel". I hope that I will be able to use the text that I wrote and these files to help people who are new to Hacking's exploit technology to understand the technology a little easier.
All my writings are written in Korean. If someone can translate the contents on my site in English. Please help me.
- Web site :https://www.lazenca.net/
- Facebook:https://www.facebook.com/Lazenca.0x0/
- 01.Hello world!
- 02.Character Device Drivers
- 03.ioctl(Input/Output control)
- 04.Creating a kernel module to privilege escalation
- 01.Stack smashing(32bit) & Return-to-user(ret2usr)
- 02.Stack smashing(64bit) & Return-to-user(ret2usr)
- 03.Stack smashing(64bit) & ROP
- 04.Write-what-where(Arbitrary Memory Overwrite)(feat.ret2usr)
- 05.Null pointer dereference(32bit & 64bit)
- 06.Use-After-Free(UAF) (feat.struct cred)
- 07.Use-After-Free(UAF) (feat.tty_struct)
- 08.ret2dir(return-to-direct-mapped memory)
About
Linux Kernel exploitation Tutorial.
Topics
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Releases
No releases published
Packages0
No packages published