Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of exploiting a Linux kernel vulnerability in the netlink subsystem to achieve local privilege escalation on Ubuntu 22.04. Delve into the details of a limited use-after-free (UAF) bug that allows unprivileged users to escalate to root on systems permitting unprivileged namespace creation. Learn about the exploitation methods employed to develop a reliable privilege escalation exploit, including techniques to bypass KASLR and execute ROP gadgets in the kernel. Discover how multiple UAF triggers are leveraged to build powerful exploit primitives, from initial leak primitives to more advanced information leaks and function pointer manipulation. Gain insights from an industry veteran with over 20 years of experience in exploit development, covering various platforms including Xen, Windows kernel, Cisco devices, and Android.