Workshop: Linux Kernel Exploitation 101 – Part 2
Read Time:1 Minute, 24 Second

Workshop: Linux Kernel Exploitation 101 – Part 2

0 0

Slide: https://hacktivesecurity-my.sharepoint.com/:b:/p/alessandro/EX9sSrCCRIlLqvkHoRl7_jQBB6xKgV_qLL9UA5fIwf2Cbw?e=cCQpix
Materiale utilizzato nel video (per poter replicare i lab): https://hacktivesecurity-my.sharepoint.com/:u:/p/alessandro/EX08cV3wTzZJsEeEQwZvw80BbybF2CpUmJdsXXGlY0hnwA?e=JaGru3
Il materiale รจ stato testato con Ubuntu 20.04 con architettura x86_64. Non dovrebbero esserci problemi con altre release.

Per iscriverti al workshop del 25 settembre, segui le pagine social di Cyber Saiyan (organizzazione di Romhack)

  • Linkedin: https://www.linkedin.com/company/cyber-saiyan/
  • Twitter: https://twitter.com/cybersaiyanIT
  • Link all’evento: https://romhack.camp/camp-schedule/

Inoltre, per rimanere aggiornato su progetti futuri, seguici su Linkedin e Twitter:

  • Linkedin: https://www.linkedin.com/company/hacktive-security/
  • Twitter: https://twitter.com/hacktivesec
  • Website: https://www.hacktivesecurity.com/

Capitoli:
0:00 Introduzione
0:25 Introduzione a gdb
1:18 Compilare il kernel con simboli
3:00 Navigazione codice sorgente
3:41 Navigazione codice sorgente: Elixir
7:04 Navigazione codice sorgente: search_binary_handler
12:33 Kernel Debugging
12:56 Qemu kernel debugging
13:42 Kernel Debugging: gdb
15:25 Kernel Debugging: search_binary_handler
19:56 Infarinatura su assembly intel
33:46 struct task_struct
34:40 arch/
37:51 task_struct
40:20 init_task
41:04 Kernel Debugging: init_task
47:41 Common Vulnerabilities
48:55 Memory Corruption & Weird Machine
51:25 Common Mitigations (Introduzione)
54:03 Heap Overflow
56:06 Lab: Heap Overflow
1:07:42 Use-After-Free
1:09:33 Lab: Use-After-Free
1:16:28 KASLR
1:17:34 SMAP & SMEP
1:19:44 SMEP
1:21:25 SMAP
1:22:54 SMAP & SMEP: x86 vs ARM
1:23:50 Exploitation Strategies
1:27:14 Victim Object
1:29:15 Victim Object: Pre-requisiti
1:29:48 Victim Object: Esempio
1:31:11 Lab: Victim Object
1:36:40 Lab: Victim Object – offset init_task
1:42:13 Conclusione

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post Workshop: Linux Kernel Exploitation 101 – Part 1
Next post How an Akamai misconfiguration earned us USD 46.000