Completed
Abusing Set's Fields
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploit Engineering: Attacking the Linux Kernel
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 LPE Attack Surface Mapping
- 3 Unprivileged User Namespaces
- 4 Network Namespace
- 5 Mount Namespace
- 6 Targeted Functionality Fuzzing
- 7 Manual Triaging Crashes
- 8 Syzbot Testcase Triage Automation
- 9 Interesting Fact About This Non-Reproducible Bug
- 10 Vulnerability
- 11 Replacement Objects
- 12 Exploits Steps
- 13 Abusing Set's Fields
- 14 Spraying Large Objects
- 15 Spraying Small Objects
- 16 What Pointer To Free?
- 17 Interesting Fact On Key Replacement
- 18 Enhanced Understanding of the SLUB Allocator
- 19 Lockless Freelist Vs Regular Freelist
- 20 Priming kmalloc-96 Main Slab Free List
- 21 Execute a gdb command for each object
- 22 Tagging chunks
- 23 Tracking Full Slabs?
- 24 Freed Expression Chunk Replacement by Key
- 25 Freed Chunk Reallocation
- 26 Manually Building Kernels
- 27 Disclosure Timeline
- 28 TargetMob Vocabulary
- 29 TargetMob Architecture
- 30 Mining Pipeline
- 31 Mining - Project Extraction
- 32 Testing Pipeline
- 33 Testing - Profilers (Userland / Kernel)
- 34 Testing - Kernel Profiler Output
- 35 Conclusion
- 36 Code Release