Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Kernel Root Exploit via a ptrace() and execve() Race Condition

Live Overflow

liveoverflow

hacking tutorial

how to hack

exploit tutorial

OSCP

privesc

priviledge escalation

privilege escalation

local root exploit

ptrace

kernel

freebsd

openbsd

serenityos

linux

xnu

darwin

macos

syscall

syscalls

unveil

execve

shellcode

payload

race condition

racecondition

vulnerability

proof of concept

exploit code

walkthrough

cve

userland

Автор: LiveOverflow

Загружено: 10 янв. 2021 г.

Просмотров: 100 817 просмотров

Описание:

Let's have a look at a recent kernel local privilege escalation exploit!

Exploit Source: https://hxp.io/blog/79/hxp-CTF-2020-w...
Kernel Developer Walkthrough:    • SerenityOS exploit analysis: HXP CTF ...  

Syscalls, Kernel vs. User Mode and Linux Kernel Source Code:    • Syscalls, Kernel vs. User Mode and Li...  
How Do Linux Kernel Drivers Work?    • How Do Linux Kernel Drivers Work? - L...  

👕 T-Shirt Series:    • My Life in Short/Shirt Stories (Decem...  

00:00 - Introduction
00:15 - Exploit PoC
00:39 - main()
00:52 - prepare_shellcode()
02:39 - mmap() shared memory to signal "ready" state
03:07 - fork() into [child] and [parent]
03:44 - [parent] wait for the child
04:00 - [child] unveil() loop
05:03 - [parent] ptrace ATTACH and POKE child
05:58 - [child] execve("passwd")
06:38 - [parent] PEEK entrypoint of child in loop
07:34 - [parent] child entrypoint changes!
07:49 - Exploit Walkthrough
09:20 - Root Shell via Shellcode
10:10 - Vulnerability Summary
10:37 - Which UNIX-like Kernel is this?
12:44 - The importance for Security Research
13:59 - Next Video and Resources
14:22 - Patreon and YT Members

=[ ❤️ Support ]=

→ per Video:   / liveoverflow  
→ per Month:    / @liveoverflow  

=[ 🐕 Social ]=

→ Twitter:   / liveoverflow  
→ Website: https://liveoverflow.com/
→ Subreddit:   / liveoverflow  
→ Facebook:   / liveoverflow  

=[ 📄 P.S. ]=

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

Kernel Root Exploit via a ptrace() and execve() Race Condition

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

How CPUs Access Hardware - Another SerenityOS Exploit

How CPUs Access Hardware - Another SerenityOS Exploit

Reading Kernel Source Code - Analysis of an Exploit

Reading Kernel Source Code - Analysis of an Exploit

Local Root Exploit in HospitalRun Software

Local Root Exploit in HospitalRun Software

How Linux Kernel Runs Executables

How Linux Kernel Runs Executables

The mind behind Linux | Linus Torvalds | TED

The mind behind Linux | Linus Torvalds | TED

How To Protect Your Linux Server From Hackers!

How To Protect Your Linux Server From Hackers!

What are Race Conditions?

What are Race Conditions?

Hacker Tweets Explained

Hacker Tweets Explained

Syscalls, Kernel vs. User Mode and Linux Kernel Source Code - bin 0x09

Syscalls, Kernel vs. User Mode and Linux Kernel Source Code - bin 0x09

Running a Buffer Overflow Attack - Computerphile

Running a Buffer Overflow Attack - Computerphile

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]