diff options
| author | Andrey Konovalov | 2020-08-30 16:51:04 +0200 |
|---|---|---|
| committer | GitHub | 2020-08-30 16:51:04 +0200 |
| commit | 01cbfb0259142da12cd83f407ae5f0f6abdfc74b (patch) | |
| tree | 6e203a30c446157b0a3396b67769bd33d96e94b3 | |
| parent | b5cc69c815b3cc33e450187244b6ccf23cfc3ca0 (diff) | |
Summer updates
| -rw-r--r-- | README.md | 48 |
1 files changed, 48 insertions, 0 deletions
| @@ -15,6 +15,8 @@ Pull requests are welcome. | |||
| 15 | 15 | ||
| 16 | ## Exploitation Techniques | 16 | ## Exploitation Techniques |
| 17 | 17 | ||
| 18 | [2020: "Structures that can be used with Kernel Exploit"](https://ptr-yudai.hatenablog.com/entry/2020/03/16/165628) [article] | ||
| 19 | |||
| 18 | [2020: "Linux Kernel Stack Smashing" by Silvio Cesare](https://blog.infosectcbr.com.au/2020/02/linux-kernel-stack-smashing.html?m=1) [article] | 20 | [2020: "Linux Kernel Stack Smashing" by Silvio Cesare](https://blog.infosectcbr.com.au/2020/02/linux-kernel-stack-smashing.html?m=1) [article] |
| 19 | 21 | ||
| 20 | [2020: "Structures that can be used in kernel exploits"](https://ptr-yudai.hatenablog.com/entry/2020/03/16/165628) [article] | 22 | [2020: "Structures that can be used in kernel exploits"](https://ptr-yudai.hatenablog.com/entry/2020/03/16/165628) [article] |
| @@ -159,6 +161,8 @@ Pull requests are welcome. | |||
| 159 | 161 | ||
| 160 | ### LPE | 162 | ### LPE |
| 161 | 163 | ||
| 164 | [2020, Black Hat USA: "TiYunZong: An Exploit Chain to Remotely Root Modern Android Devices" by Guang Gong](https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices/blob/master/us-20-Gong-TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices.pdf) [slides, CVE-2019-10567] [[paper](https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices/blob/master/us-20-Gong-TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices-wp.pdf)] | ||
| 165 | |||
| 162 | [2020: "Binder - Analysis and exploitation of CVE-2020-0041" by Jean-Baptiste Cayrou](https://www.synacktiv.com/posts/exploit/binder-analysis-and-exploitation-of-cve-2020-0041.html) [article, CVE-2020-0041] | 166 | [2020: "Binder - Analysis and exploitation of CVE-2020-0041" by Jean-Baptiste Cayrou](https://www.synacktiv.com/posts/exploit/binder-analysis-and-exploitation-of-cve-2020-0041.html) [article, CVE-2020-0041] |
| 163 | 167 | ||
| 164 | [2020, THCON: "Binder IPC and its vulnerabilities" by Jean-Baptiste Cayrou](https://www.synacktiv.com/ressources/thcon2020_binder.pdf) [slides, CVE-2019-2215, CVE-2019-2025, CVE-2019-2181, CVE-2019-2214, CVE-2020-0041] | 168 | [2020, THCON: "Binder IPC and its vulnerabilities" by Jean-Baptiste Cayrou](https://www.synacktiv.com/ressources/thcon2020_binder.pdf) [slides, CVE-2019-2215, CVE-2019-2025, CVE-2019-2181, CVE-2019-2214, CVE-2020-0041] |
| @@ -414,6 +418,10 @@ Pull requests are welcome. | |||
| 414 | 418 | ||
| 415 | ## Protection Bypass Techniques | 419 | ## Protection Bypass Techniques |
| 416 | 420 | ||
| 421 | [2020: "SELinux RKP misconfiguration on Samsung S20 devices" by Vitaly Nikolenko](https://duasynt.com/blog/samsung-s20-rkp-selinux-disable) [article] | ||
| 422 | |||
| 423 | [2020: "TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs"](https://download.vusec.net/papers/tagbleed_eurosp20.pdf) [paper] | ||
| 424 | |||
| 417 | [2020: "Weaknesses in Linux Kernel Heap Hardening" by Silvio Cesare](https://blog.infosectcbr.com.au/2020/03/weaknesses-in-linux-kernel-heap.html) [article] | 425 | [2020: "Weaknesses in Linux Kernel Heap Hardening" by Silvio Cesare](https://blog.infosectcbr.com.au/2020/03/weaknesses-in-linux-kernel-heap.html) [article] |
| 418 | 426 | ||
| 419 | [2020: "An Analysis of Linux Kernel Heap Hardening" by Silvio Cesare](https://blog.infosectcbr.com.au/2020/04/an-analysis-of-linux-kernel-heap.html) [article] | 427 | [2020: "An Analysis of Linux Kernel Heap Hardening" by Silvio Cesare](https://blog.infosectcbr.com.au/2020/04/an-analysis-of-linux-kernel-heap.html) [article] |
| @@ -457,6 +465,16 @@ Pull requests are welcome. | |||
| 457 | 465 | ||
| 458 | ## Defensive | 466 | ## Defensive |
| 459 | 467 | ||
| 468 | [2020, OSTconf: "LKRG IN A NUTSHELL" by Adam Zabrocki](https://www.openwall.com/presentations/OSTconf2020-LKRG-In-A-Nutshell/OSTconf2020-LKRG-In-A-Nutshell.pdf) [slides] | ||
| 469 | |||
| 470 | [2020, Linux Plumbers: "syzkaller / sanitizers: status update" by Dmitry Vyukov](https://linuxplumbersconf.org/event/7/contributions/716/attachments/645/1181/syzkaller_LPC2020.pdf) [slides] [[video](https://www.youtube.com/watch?v=y9Glc90WUN0&t=234)] | ||
| 471 | |||
| 472 | [2020, Linux Plumbers: "Following the Linux Kernel Defence Map" by Alexander Popov](https://linuxplumbersconf.org/event/7/contributions/775/attachments/610/1096/Following_the_Linux_Kernel_Defence_Map.pdf) [slides] [[video](https://www.youtube.com/watch?v=4c01jjbQmBc&t=8555)] | ||
| 473 | |||
| 474 | [2020: "Memory Tagging for the Kernel: Tag-Based KASAN" by Andrey Konovalov](https://docs.google.com/presentation/d/10V_msbtEap9dNerKvTrRAzvfzYdrQFC8e2NYHCZYJDE/edit?usp=sharing) [slides] [[video](https://www.youtube.com/watch?v=f-Rm7JFsJGI)] | ||
| 475 | |||
| 476 | [2020: "10 Years of Linux Security - A Report Card" by Bradley Spengler](https://grsecurity.net/10_years_of_linux_security.pdf) [slides] [[video](https://www.youtube.com/watch?v=F_Kza6fdkSU)] | ||
| 477 | |||
| 460 | [2020, linux.conf.au: "Control Flow Integrity in the Linux Kernel" by Kees Cook](https://outflux.net/slides/2020/lca/cfi.pdf) [slides] [[video](https://www.youtube.com/watch?v=0Bj6W7qrOOI)] | 478 | [2020, linux.conf.au: "Control Flow Integrity in the Linux Kernel" by Kees Cook](https://outflux.net/slides/2020/lca/cfi.pdf) [slides] [[video](https://www.youtube.com/watch?v=0Bj6W7qrOOI)] |
| 461 | 479 | ||
| 462 | [2019: "Camouflage: Hardware-assisted CFI for the ARM Linux kernel"](https://arxiv.org/pdf/1912.04145v1.pdf) [paper] | 480 | [2019: "Camouflage: Hardware-assisted CFI for the ARM Linux kernel"](https://arxiv.org/pdf/1912.04145v1.pdf) [paper] |
| @@ -538,6 +556,26 @@ Pull requests are welcome. | |||
| 538 | 556 | ||
| 539 | ## Vulnerability Discovery | 557 | ## Vulnerability Discovery |
| 540 | 558 | ||
| 559 | [2020: "Fuzzing the Linux kernel (x86) entry code, Part 1 of 3" by Vegard Nossum](https://blogs.oracle.com/linux/fuzzing-the-linux-kernel-x86-entry-code%2c-part-1-of-3) [article] | ||
| 560 | |||
| 561 | [2020: "Fuzzing the Linux kernel (x86) entry code, Part 2 of 3" by Vegard Nossum](https://blogs.oracle.com/linux/fuzzing-the-linux-kernel-x86-entry-code%2c-part-2-of-3) [article] | ||
| 562 | |||
| 563 | [2020: "Fuzzing the Linux kernel (x86) entry code, Part 3 of 3" by Vegard Nossum](https://blogs.oracle.com/linux/fuzzing-the-linux-kernel-x86-entry-code%2c-part-3-of-3) [article] | ||
| 564 | |||
| 565 | [2020, Linux Plumbers: "Data-race detection in the Linux kernel" by Marco Elver](https://linuxplumbersconf.org/event/7/contributions/647/attachments/549/972/LPC2020-KCSAN.pdf) [slides] [[video](https://www.youtube.com/watch?v=gJRBmunG47w&t=7141)] | ||
| 566 | |||
| 567 | [2020: "harbian-qa: State-based target directed fuzzer based on syzkaller"](https://github.com/hardenedlinux/harbian-qa/blob/master/syzkaller/design_inplementation_intro.md) [article] | ||
| 568 | |||
| 569 | [2020: "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints"](https://www.usenix.org/system/files/sec20-song.pdf) [paper] [[slides](https://www.usenix.org/system/files/sec20_slides_song.pdf)] | ||
| 570 | |||
| 571 | [2020: "Using syzkaller, part 1: Fuzzing the Linux kernel" by Andre Almeida](https://www.collabora.com/news-and-blog/blog/2020/03/26/syzkaller-fuzzing-the-kernel/) [article] | ||
| 572 | |||
| 573 | [2020: "Using syzkaller, part 2: Detecting programming bugs in the Linux kernel" by Andre Almeida](https://www.collabora.com/news-and-blog/blog/2020/04/17/using-syzkaller-to-detect-programming-bugs-in-linux/) [article] | ||
| 574 | |||
| 575 | [2020: "Using syzkaller, part 3: Fuzzing your changes" by Andre Almeida](https://www.collabora.com/news-and-blog/blog/2020/05/12/using-syzkaller-fuzzing-your-changes/) [article] | ||
| 576 | |||
| 577 | [2020: "Using syzkaller, part 4: Driver fuzzing" by Andre Almeida](https://www.collabora.com/news-and-blog/blog/2020/06/26/using-syzkaller-part-4-driver-fuzzing/) [article] | ||
| 578 | |||
| 541 | [2020: "HFL: Hybrid Fuzzing on the Linux Kernel"](https://www.ndss-symposium.org/wp-content/uploads/2020/02/24018.pdf) [paper] | 579 | [2020: "HFL: Hybrid Fuzzing on the Linux Kernel"](https://www.ndss-symposium.org/wp-content/uploads/2020/02/24018.pdf) [paper] |
| 542 | 580 | ||
| 543 | [2020: "Effective Detection of Sleep-in-atomic-context Bugs in the Linux Kernel"](https://dl.acm.org/doi/pdf/10.1145/3381990) [paper] | 581 | [2020: "Effective Detection of Sleep-in-atomic-context Bugs in the Linux Kernel"](https://dl.acm.org/doi/pdf/10.1145/3381990) [paper] |
| @@ -552,6 +590,8 @@ Pull requests are welcome. | |||
| 552 | 590 | ||
| 553 | [2020: "Analyzing the Linux Kernel in Userland with AFL and KLEE"](https://blog.grimm-co.com/post/analyzing-the-linux-kernel-in-userland-with-afl-and-klee/) [article] | 591 | [2020: "Analyzing the Linux Kernel in Userland with AFL and KLEE"](https://blog.grimm-co.com/post/analyzing-the-linux-kernel-in-userland-with-afl-and-klee/) [article] |
| 554 | 592 | ||
| 593 | [2019: "Industry Practice of Coverage-Guided Enterprise Linux Kernel Fuzzing"](http://wingtecher.com/themes/WingTecherResearch/assets/papers/fse19-linux-kernel.pdf) [paper] | ||
| 594 | |||
| 555 | [2019: "Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers"](https://hal.inria.fr/hal-02182516/document) [paper] | 595 | [2019: "Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers"](https://hal.inria.fr/hal-02182516/document) [paper] |
| 556 | 596 | ||
| 557 | [2019: "A gentle introduction to Linux Kernel fuzzing" by | 597 | [2019: "A gentle introduction to Linux Kernel fuzzing" by |
| @@ -735,6 +775,8 @@ https://github.com/bluefrostsecurity/CVE-2020-0041/ | |||
| 735 | 775 | ||
| 736 | https://github.com/chompie1337/s8_2019_2215_poc/ | 776 | https://github.com/chompie1337/s8_2019_2215_poc/ |
| 737 | 777 | ||
| 778 | https://github.com/c3r34lk1ll3r/CVE-2017-5123 | ||
| 779 | |||
| 738 | 780 | ||
| 739 | ## Tools | 781 | ## Tools |
| 740 | 782 | ||
| @@ -774,6 +816,10 @@ https://github.com/mephi42/ida-kallsyms/ | |||
| 774 | 816 | ||
| 775 | [[ KASLD ] Kernel Address Space Layout Derandomization](https://github.com/bcoles/kasld) | 817 | [[ KASLD ] Kernel Address Space Layout Derandomization](https://github.com/bcoles/kasld) |
| 776 | 818 | ||
| 819 | https://github.com/IntelLabs/kAFL/ | ||
| 820 | |||
| 821 | https://github.com/securesystemslab/agamotto | ||
| 822 | |||
| 777 | ## CTF Tasks | 823 | ## CTF Tasks |
| 778 | 824 | ||
| 779 | CSAW CTF 2010: [writeup](https://jon.oberheide.org/blog/2010/11/02/csaw-ctf-kernel-exploitation-challenge/), [source](https://jon.oberheide.org/files/csaw.c), [source and exploit](https://github.com/0x3f97/pwn/tree/master/kernel/csaw-ctf-2010-kernel-exploitation-challenge) | 825 | CSAW CTF 2010: [writeup](https://jon.oberheide.org/blog/2010/11/02/csaw-ctf-kernel-exploitation-challenge/), [source](https://jon.oberheide.org/files/csaw.c), [source and exploit](https://github.com/0x3f97/pwn/tree/master/kernel/csaw-ctf-2010-kernel-exploitation-challenge) |
| @@ -838,6 +884,8 @@ DEF CON CTF Qualifier 2020 (keml): [source](https://github.com/o-o-overflow/dc20 | |||
| 838 | 884 | ||
| 839 | DEF CON CTF Qualifier 2020 (fungez): [source](https://github.com/o-o-overflow/dc2020q-fungez-public), [exploit and writeup](https://github.com/BrieflyX/ctf-pwns/tree/master/kernel/fungez) | 885 | DEF CON CTF Qualifier 2020 (fungez): [source](https://github.com/o-o-overflow/dc2020q-fungez-public), [exploit and writeup](https://github.com/BrieflyX/ctf-pwns/tree/master/kernel/fungez) |
| 840 | 886 | ||
| 887 | ASIS CTF 2020 (Shared House): [writeup](https://ptr-yudai.hatenablog.com/entry/2020/07/06/000622#354pts-Shared-House-7-solves) | ||
| 888 | |||
| 841 | 889 | ||
| 842 | ## Misc | 890 | ## Misc |
| 843 | 891 | ||
