Linux Kernel Mitigation & Bypass
Like user mode, there are also couples of ways of mitigation against exploits in Linux kernel. Here is a list of mitigation in kernel mode and methods to bypass some of them.
Like user mode, there are also couples of ways of mitigation against exploits in Linux kernel. Here is a list of mitigation in kernel mode and methods to bypass some of them.
prelude of the new theme demo babble
Congratulations to Kaztebin, ranked 1 in DEFCON CTF29 again.
It reminds me of my first ctf competition with Katzebin: hxp2020 [1]. There are some excellent challenges in this game which I missed out at that time, including some linux kernel exploitations. Recently I started to learn kernel pwn, and I think it’s time to solve these left challenges.
周末和学弟学妹一起打的一场比赛,比较基础,但涉及的知识面较广,有必要整理查漏补缺 url: https://ctftime.org/event/1397 rank 8 with lilac
国内最受瞩目的比赛之一,拥有几乎最高的PWN/realworld赛题质量。
比赛时看了几道cold down, EXSI找到了洞但是不好复现…
.torrent文件是BT种子文件格式,CTorrent是该文件格式的解析器。由于解析器解析过程中某个解析函数缺少长度检测,在解析由用户可控大小的Path时会将用户输入memcpy到栈上定长buffer,可造成栈溢出,ROP提权。
复现契机来自于强网先锋[强网杯2021final]
最近写应用程序感觉 python,java 的 gui 太丑了,咨询了一波web爷爷。在一星期内从零开始入门了前后端分离的开发框架,并成功赶在实验截止日期前套用,治好了我的强迫症. 在这个过程中不成体系且稀碎地顺手记录了一下,权当纪念这段爆肝的日子。
Some birds aren’t meant to be caged,their feathers are just too bright.