diff options
| author | Andrey Konovalov | 2017-06-23 17:26:03 +0200 |
|---|---|---|
| committer | GitHub | 2017-06-23 17:26:03 +0200 |
| commit | 40fd66e39a520929ae0d43654f8e0caa15bec7e6 (patch) | |
| tree | 2566fddab8567105476e229e9f778b233830c460 | |
| parent | 02bd1194825468d9ab02b34fcba8cb2bfcbac751 (diff) | |
Update README.md
| -rw-r--r-- | README.md | 9 |
1 files changed, 7 insertions, 2 deletions
| @@ -53,8 +53,6 @@ Pull requests are welcome. | |||
| 53 | 53 | ||
| 54 | [2010, SOURCE Boston: "Linux Kernel Exploitation: Earning Its Pwnie a Vuln at a Time" by Jon Oberheide](https://jon.oberheide.org/files/source10-linuxkernel-jonoberheide.pdf) [slides] | 54 | [2010, SOURCE Boston: "Linux Kernel Exploitation: Earning Its Pwnie a Vuln at a Time" by Jon Oberheide](https://jon.oberheide.org/files/source10-linuxkernel-jonoberheide.pdf) [slides] |
| 55 | 55 | ||
| 56 | [2010: "Exploiting large memory management vulnerabilities in Xorg server running on Linux" by Rafal Wojtczuk](http://invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf) [article] | ||
| 57 | |||
| 58 | [2009, CanSecWest: "There's a party at ring0, and you're invited" by Tavis Ormandy and Julien Tinnes](https://www.cr0.org/paper/to-jt-party-at-ring0.pdf) [slides] | 56 | [2009, CanSecWest: "There's a party at ring0, and you're invited" by Tavis Ormandy and Julien Tinnes](https://www.cr0.org/paper/to-jt-party-at-ring0.pdf) [slides] |
| 59 | 57 | ||
| 60 | [2007: "Kernel-mode exploits primer" by Sylvester Keil and Clemens Kolbitsch](http://old.iseclab.org/projects/vifuzz/docs/exploit.pdf) [whitepaper] | 58 | [2007: "Kernel-mode exploits primer" by Sylvester Keil and Clemens Kolbitsch](http://old.iseclab.org/projects/vifuzz/docs/exploit.pdf) [whitepaper] |
| @@ -211,6 +209,13 @@ Pull requests are welcome. | |||
| 211 | [2009: "When a "potential D.o.S." means a one-shot remote kernel exploit: the SCTP story"](https://kernelbof.blogspot.de/2009/04/kernel-memory-corruptions-are-not-just.html) [article, CVE-2009-0065] | 209 | [2009: "When a "potential D.o.S." means a one-shot remote kernel exploit: the SCTP story"](https://kernelbof.blogspot.de/2009/04/kernel-memory-corruptions-are-not-just.html) [article, CVE-2009-0065] |
| 212 | 210 | ||
| 213 | 211 | ||
| 212 | ## Userspace | ||
| 213 | |||
| 214 | [2017: "The Stack Clash" by Qualys Research Team](https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt) [article] | ||
| 215 | |||
| 216 | [2010: "Exploiting large memory management vulnerabilities in Xorg server running on Linux" by Rafal Wojtczuk](http://invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf) [article] | ||
| 217 | |||
| 218 | |||
| 214 | ## Protection bypass techniques | 219 | ## Protection bypass techniques |
| 215 | 220 | ||
| 216 | [2016: "Linux Kernel x86-64 bypass SMEP - KASLR - kptr_restric"](http://blackbunny.io/linux-kernel-x86-64-bypass-smep-kaslr-kptr_restric/) [article] | 221 | [2016: "Linux Kernel x86-64 bypass SMEP - KASLR - kptr_restric"](http://blackbunny.io/linux-kernel-x86-64-bypass-smep-kaslr-kptr_restric/) [article] |
