Exploit Engineering: Attacking the Linux Kernel

Exploit Engineering: Attacking the Linux Kernel

OffensiveCon via YouTube Direct link

Manually Building Kernels

26 of 36

26 of 36

Manually Building Kernels

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploit Engineering: Attacking the Linux Kernel

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 LPE Attack Surface Mapping
  3. 3 Unprivileged User Namespaces
  4. 4 Network Namespace
  5. 5 Mount Namespace
  6. 6 Targeted Functionality Fuzzing
  7. 7 Manual Triaging Crashes
  8. 8 Syzbot Testcase Triage Automation
  9. 9 Interesting Fact About This Non-Reproducible Bug
  10. 10 Vulnerability
  11. 11 Replacement Objects
  12. 12 Exploits Steps
  13. 13 Abusing Set's Fields
  14. 14 Spraying Large Objects
  15. 15 Spraying Small Objects
  16. 16 What Pointer To Free?
  17. 17 Interesting Fact On Key Replacement
  18. 18 Enhanced Understanding of the SLUB Allocator
  19. 19 Lockless Freelist Vs Regular Freelist
  20. 20 Priming kmalloc-96 Main Slab Free List
  21. 21 Execute a gdb command for each object
  22. 22 Tagging chunks
  23. 23 Tracking Full Slabs?
  24. 24 Freed Expression Chunk Replacement by Key
  25. 25 Freed Chunk Reallocation
  26. 26 Manually Building Kernels
  27. 27 Disclosure Timeline
  28. 28 TargetMob Vocabulary
  29. 29 TargetMob Architecture
  30. 30 Mining Pipeline
  31. 31 Mining - Project Extraction
  32. 32 Testing Pipeline
  33. 33 Testing - Profilers (Userland / Kernel)
  34. 34 Testing - Kernel Profiler Output
  35. 35 Conclusion
  36. 36 Code Release

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.