목록Linux kernel exploit 13
strangerRidingCaml
Bypassing Kernel Self-Protection MechanismsKernel self-protection mechanisms are security features implemented in modern operating systems to prevent and mitigate kernel-level attacks. However, skilled attackers may attempt to bypass these mechanisms to execute malicious code in the kernel.Lab Activity: Bypassing Kernel Self-Protection MechanismsIn this lab activity, we'll demonstrate bypassing ..
Segregation of Kernel Memory from Userspace MemorySegregation of kernel memory from userspace memory is a security feature implemented in modern operating systems, including x86's Supervisor Mode Execution Protection SMEP, Supervisor Mode Access Prevention SMAP, and ARM's Privileged eXecute Never PXN and Privileged Access Never PAN. These features prevent the execution of code from users..
Kernel Address Space Layout Randomization KASLRKernel Address Space Layout Randomization KASLR is a security feature implemented in modern operating systems, including Linux, to mitigate memory-based attacks by randomizing the location of kernel memory.Lab Activity: Demonstrating KASLR ImpactIn this lab activity, we'll demonstrate the impact of KASLR by attempting to exploit a vulnerability ..
Return-to-Direct-Mapped Memory ret2dir AttacksReturn-to-Direct-Mapped Memory ret2dir attacks involve redirecting program execution to a specific location in memory, typically to execute malicious code or escalate privileges.Lab Activity: Return-to-Direct-Mapped Memory ret2dir AttackIn this lab activity, we'll demonstrate a ret2dir attack on a vulnerable C program.Defender Side Code:#includ..
Use-After-Free UAF Vulnerabilities feat.structcred,ttystructUse-After-Free UAF vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, potentially leading to memory corruption or code execution.Lab Activity: Use-After-Free UAF ExploitIn this lab activity, we'll demonstrate a UAF exploit on a vulnerable C program, featuring struct ..
Null Pointer Dereference ExploitsNull pointer dereference exploits occur when a program attempts to access or manipulate memory using a null pointer, resulting in a segmentation fault or allowing an attacker to control program execution.Lab Activity: Null Pointer Dereference ExploitIn this lab activity, we'll demonstrate a simple null pointer dereference exploit on a vulnerable C program.Defende..