Completed
Case summary
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Linux distribution families
- 3 Top 6 CWE in Linux kernel
- 4 Representative kernel vulnerabilities
- 5 Linux privilege escalation
- 6 Common LPE flow
- 7 Control execution flow
- 8 For specific vulnerability types
- 9 Get arbitrary memory write
- 10 What is addr limit?
- 11 Gain root privilege
- 12 eBPF verifier bypass vulnerability
- 13 Verifier simulation execution
- 14 Actual code running
- 15 Conventional UAF exploit chain
- 16 TOCTOU & pipe subsystem
- 17 Combine list operation with pipe heap spray
- 18 Case summary
- 19 Conclusion