본문 바로가기

kernel

2024 공부할꺼

technique


  1. all in one
    1. https://arttnba3.cn/2021/03/03/PWN-0X00-LINUX-KERNEL-PWN-PART-I/#%E7%AC%94%E8%80%85%E8%87%AA%E7%94%A8%E6%A8%A1%E6%9D%BF
  2. race condition
    1. FUSE for exploitation : https://exploiter.dev/blog/2022/FUSE-exploit.html  
    2. mmap for exploitation : no link
  3. dirty series
    1. dirty cred
      1. https://i.blackhat.com/USA-22/Thursday/US-22-Lin-Cautious-A-New-Exploitation-Method.pdf
      2. https://zplin.me/papers/DirtyCred.pdf
      3. https://www.youtube.com/watch?v=KEStazCf8vc
      4. https://github.com/Markakd/DirtyCred
      5. https://starlabs.sg/blog/2023/07-a-new-method-for-container-escape-using-file-based-dirtycred/
      6. https://blog.wohin.me/posts/linux-kernel-pwn-06/
    2. dirty pagetable
      1. https://uz56764.tistory.com/116?category=1037366
      2. https://ptr-yudai.hatenablog.com/entry/2023/12/08/093606
      3. https://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html
  4.  cross cache technique
    1.  
    2. Cross Cache Attack技术细节分析 (veritas501.github.io)
  5. kaslr bypass
    1. https://www.willsroot.io/2022/12/entrybleed.html
  6. data only exploitation
    1. https://h0mbre.github.io/kCTF_Data_Only_Exploit/
  7. null byte dereferences
    1. https://buff.ly/3ZOekyI
  8. ds
  9.  
  10. FG-kalsr bypass
    1. https://www.cnblogs.com/hetianlab/p/17540071.html
  11. fuzzing
    1. 🔍 Looking for Remote Code Execution bugs in the Linux kernel | Andrey Konovalov (xairy.io)

CVE's


CTF challenge

 

debugging

 


other resource