<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://kernsec.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Exploit_Methods</id>
	<title>Exploit Methods - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://kernsec.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Exploit_Methods"/>
	<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Exploit_Methods&amp;action=history"/>
	<updated>2026-04-20T14:57:19Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Exploit_Methods&amp;diff=3720&amp;oldid=prev</id>
		<title>KeesCook at 20:52, 4 November 2015</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Exploit_Methods&amp;diff=3720&amp;oldid=prev"/>
		<updated>2015-11-04T20:52:21Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:52, 4 November 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;When [[Bug Classes|bugs]]in the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. Here we try to explain them, link to examples, and link to defenses that are or could be used to eliminate an exploitation method.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;When [[Bug Classes|bugs]] in the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. Here we try to explain them, link to examples, and link to defenses that are or could be used to eliminate an exploitation method.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Kernel Self Protection Project]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Kernel Self Protection Project]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>KeesCook</name></author>
	</entry>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Exploit_Methods&amp;diff=3719&amp;oldid=prev</id>
		<title>KeesCook: Created page with &quot;When bugsin the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. H...&quot;</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Exploit_Methods&amp;diff=3719&amp;oldid=prev"/>
		<updated>2015-11-04T20:52:10Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;When &lt;a href=&quot;/wiki/index.php/Bug_Classes&quot; title=&quot;Bug Classes&quot;&gt;bugsin&lt;/a&gt; the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. H...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;When [[Bug Classes|bugs]]in the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. Here we try to explain them, link to examples, and link to defenses that are or could be used to eliminate an exploitation method.&lt;br /&gt;
&lt;br /&gt;
[[Kernel Self Protection Project]]&lt;/div&gt;</summary>
		<author><name>KeesCook</name></author>
	</entry>
</feed>