diff options
| author | Andrey Konovalov | 2017-06-23 17:24:01 +0200 |
|---|---|---|
| committer | GitHub | 2017-06-23 17:24:01 +0200 |
| commit | 02bd1194825468d9ab02b34fcba8cb2bfcbac751 (patch) | |
| tree | 708ba78df44ec0b101faa3d96407b86492afb3a5 | |
| parent | 7eb94fc86ccf0c0702bac85e59cf65f5c806ad65 (diff) | |
| parent | ff761c06a24e6aff7eb5cdec9ca81cbb4ff28d7c (diff) | |
Merge pull request #3 from raminfp/master
Exploiting large memory management
| -rw-r--r-- | README.md | 2 |
1 files changed, 2 insertions, 0 deletions
| @@ -53,6 +53,8 @@ Pull requests are welcome. | |||
| 53 | 53 | ||
| 54 | [2010, SOURCE Boston: "Linux Kernel Exploitation: Earning Its Pwnie a Vuln at a Time" by Jon Oberheide](https://jon.oberheide.org/files/source10-linuxkernel-jonoberheide.pdf) [slides] | 54 | [2010, SOURCE Boston: "Linux Kernel Exploitation: Earning Its Pwnie a Vuln at a Time" by Jon Oberheide](https://jon.oberheide.org/files/source10-linuxkernel-jonoberheide.pdf) [slides] |
| 55 | 55 | ||
| 56 | [2010: "Exploiting large memory management vulnerabilities in Xorg server running on Linux" by Rafal Wojtczuk](http://invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf) [article] | ||
| 57 | |||
| 56 | [2009, CanSecWest: "There's a party at ring0, and you're invited" by Tavis Ormandy and Julien Tinnes](https://www.cr0.org/paper/to-jt-party-at-ring0.pdf) [slides] | 58 | [2009, CanSecWest: "There's a party at ring0, and you're invited" by Tavis Ormandy and Julien Tinnes](https://www.cr0.org/paper/to-jt-party-at-ring0.pdf) [slides] |
| 57 | 59 | ||
| 58 | [2007: "Kernel-mode exploits primer" by Sylvester Keil and Clemens Kolbitsch](http://old.iseclab.org/projects/vifuzz/docs/exploit.pdf) [whitepaper] | 60 | [2007: "Kernel-mode exploits primer" by Sylvester Keil and Clemens Kolbitsch](http://old.iseclab.org/projects/vifuzz/docs/exploit.pdf) [whitepaper] |
