User contributions
Jump to navigation
Jump to search
- 19:20, 10 December 2015 diff hist +202 Exploit Methods/Userspace data usage →Details
- 19:18, 10 December 2015 diff hist +7 Exploit Methods/Userspace data usage →Mitigations
- 19:15, 10 December 2015 diff hist +59 Exploit Methods/Userspace data usage →Mitigations
- 18:45, 10 December 2015 diff hist +26 Exploit Methods/Userspace data usage →Mitigations
- 18:45, 10 December 2015 diff hist +2 Exploit Methods/Userspace data usage →Mitigations
- 18:38, 10 December 2015 diff hist +640 Exploit Methods/Userspace data usage
- 18:22, 10 December 2015 diff hist +140 Exploit Methods/Userspace execution
- 22:02, 18 November 2015 diff hist +47 Exploit Methods/Text overwrite →Examples current
- 21:49, 17 November 2015 diff hist +544 Kernel Self Protection Project principles
- 21:40, 17 November 2015 diff hist +129 Exploit Methods/Userspace data usage →Examples
- 01:50, 5 November 2015 diff hist +147 Bug Classes/Kernel pointer leak →Details current
- 23:25, 4 November 2015 diff hist +557 N Exploit Methods/Reused code chunks Created page with "= Details = This is more generally knows as Return Oriented Programming (ROP) or Jump Oriented Programming (JOP), but ultimately boils down to using the kernel's own executabl..."
- 23:20, 4 November 2015 diff hist +689 N Exploit Methods/Userspace data usage Created page with "= Details = Sometimes an attacker won't be able to control the instruction pointer directly, but they will be able to redirect the dereference a structure or other pointer. In..."
- 23:15, 4 November 2015 diff hist +626 N Exploit Methods/Userspace execution Created page with "= Details = Once an attacker has gain control over the instruction pointers, it must be aimed somewhere. The place where attackers have the most control over memory layout ten..."
- 23:10, 4 November 2015 diff hist +702 N Exploit Methods/Function pointer overwrite Created page with "= Details = When an attacker has a write primitive, they can start function pointers to redirect execution. Function pointers exist in a large number of places in the kernel r..."
- 23:00, 4 November 2015 diff hist +376 N Exploit Methods/Text overwrite Created page with "= Details = If an attacker has a write primitive and knows where the kernel is located in memory, they could overwrite functions to do whatever they wanted. Protecting against..."
- 22:55, 4 November 2015 diff hist +2 Exploit Methods/Kernel location →Details current
- 22:54, 4 November 2015 diff hist −2 m Exploit Methods/Kernel location →Mitigations
- 22:54, 4 November 2015 diff hist +876 N Exploit Methods/Kernel location Created page with "= Details = Finding the kernel location can be an important first step for exploitation. Without it, for example, it's harder to make kernel function calls for privilege escal..."
- 22:46, 4 November 2015 diff hist +96 Active Projects →ASLR for kernel code current