목록Linux kernel exploit (13)
strangerRidingCaml
Bypassing Kernel Self-Protection MechanismsKernel self-protection mechanisms are security features implemented in modern operating systems to prevent and mitigate kernel-level attacks. However, skilled attackers may attempt to bypass these mechanisms to execute malicious code in the kernel.Lab Activity: Bypassing Kernel Self-Protection MechanismsIn this lab activity, we'll demonstrate bypassing ..
Segregation of Kernel Memory from Userspace MemorySegregation of kernel memory from userspace memory is a security feature implemented in modern operating systems, including x86's Supervisor Mode Execution Protection (SMEP), Supervisor Mode Access Prevention (SMAP), and ARM's Privileged eXecute Never (PXN) and Privileged Access Never (PAN). These features prevent the execution of code from users..
Kernel Address Space Layout Randomization (KASLR)Kernel Address Space Layout Randomization (KASLR) is a security feature implemented in modern operating systems, including Linux, to mitigate memory-based attacks by randomizing the location of kernel memory.Lab Activity: Demonstrating KASLR ImpactIn this lab activity, we'll demonstrate the impact of KASLR by attempting to exploit a vulnerability ..
Return-to-Direct-Mapped Memory (ret2dir) AttacksReturn-to-Direct-Mapped Memory (ret2dir) attacks involve redirecting program execution to a specific location in memory, typically to execute malicious code or escalate privileges.Lab Activity: Return-to-Direct-Mapped Memory (ret2dir) AttackIn this lab activity, we'll demonstrate a ret2dir attack on a vulnerable C program.Defender Side Code:#includ..
Use-After-Free (UAF) Vulnerabilities (feat. struct cred, tty_struct)Use-After-Free (UAF) vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, potentially leading to memory corruption or code execution.Lab Activity: Use-After-Free (UAF) ExploitIn this lab activity, we'll demonstrate a UAF exploit on a vulnerable C program, featuring struct ..
Null Pointer Dereference ExploitsNull pointer dereference exploits occur when a program attempts to access or manipulate memory using a null pointer, resulting in a segmentation fault or allowing an attacker to control program execution.Lab Activity: Null Pointer Dereference ExploitIn this lab activity, we'll demonstrate a simple null pointer dereference exploit on a vulnerable C program.Defende..