diff options
| author | Andrey Konovalov | 2017-12-17 23:43:07 +0100 |
|---|---|---|
| committer | GitHub | 2017-12-17 23:43:07 +0100 |
| commit | 53ed07b2ad02ec22401d9a956a7a721253384429 (patch) | |
| tree | 8a4fb61783db1c8eee7754a0c34a3eff1b1d801b | |
| parent | abb2d9cd45c9adea0cda030481ddb616a23a270a (diff) | |
Update README.md
| -rw-r--r-- | README.md | 34 |
1 files changed, 31 insertions, 3 deletions
| @@ -12,6 +12,8 @@ Pull requests are welcome. | |||
| 12 | 12 | ||
| 13 | ## Exploitation techniques | 13 | ## Exploitation techniques |
| 14 | 14 | ||
| 15 | [2017: "KERNELFAULT: Pwning Linux using Hardware Fault Injection" by Niek Timmers and Cristofaro Mune](https://www.youtube.com/watch?v=nqF_IjXg_uM) [video] | ||
| 16 | |||
| 15 | [2017: "Kernel Driver mmap Handler Exploitation" by Mateusz Fruba](https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-mmap-exploitation-whitepaper-2017-09-18.pdf) [whitepaper] | 17 | [2017: "Kernel Driver mmap Handler Exploitation" by Mateusz Fruba](https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-mmap-exploitation-whitepaper-2017-09-18.pdf) [whitepaper] |
| 16 | 18 | ||
| 17 | [2017: "Linux kernel addr_limit bug / exploitation" by Vitaly Nikolenko](https://www.youtube.com/watch?v=UFakJa3t8Ls) [video] | 19 | [2017: "Linux kernel addr_limit bug / exploitation" by Vitaly Nikolenko](https://www.youtube.com/watch?v=UFakJa3t8Ls) [video] |
| @@ -96,6 +98,12 @@ Pull requests are welcome. | |||
| 96 | 98 | ||
| 97 | ### LPE | 99 | ### LPE |
| 98 | 100 | ||
| 101 | [2017: "The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel" by Di Shen](https://speakerdeck.com/retme7/the-art-of-exploiting-unconventional-use-after-free-bugs-in-android-kernel) [slides, CVE-2017-0403, CVE-2016-6787] | ||
| 102 | |||
| 103 | [2017: "Exploiting CVE-2017-5123 with full protections. SMEP, SMAP, and the Chrome Sandbox!" by Chris Salls](https://salls.github.io/Linux-Kernel-CVE-2017-5123/) [article, CVE-2017-5123] | ||
| 104 | |||
| 105 | [2017: "Exploiting CVE-2017-5123" by Federico Bento](https://reverse.put.as/2017/11/07/exploiting-cve-2017-5123/) [article, CVE-2017-5123] | ||
| 106 | |||
| 99 | [2017: "Exploiting on CVE-2016-6787"](https://hardenedlinux.github.io/system-security/2017/10/16/Exploiting-on-CVE-2016-6787.html) [article, CVE-2016-6787] | 107 | [2017: "Exploiting on CVE-2016-6787"](https://hardenedlinux.github.io/system-security/2017/10/16/Exploiting-on-CVE-2016-6787.html) [article, CVE-2016-6787] |
| 100 | 108 | ||
| 101 | [2017: "Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit" by Alexander Popov](https://www.youtube.com/watch?v=g7Qm0NpPAz4) [video, CVE-2017-2636] | 109 | [2017: "Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit" by Alexander Popov](https://www.youtube.com/watch?v=g7Qm0NpPAz4) [video, CVE-2017-2636] |
| @@ -269,6 +277,8 @@ Pull requests are welcome. | |||
| 269 | 277 | ||
| 270 | ## Defensive | 278 | ## Defensive |
| 271 | 279 | ||
| 280 | [2017: "Towards Linux Kernel Memory Safety"](https://arxiv.org/pdf/1710.06175.pdf) [whitepaper] | ||
| 281 | |||
| 272 | [2017: "Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel"](https://events.linuxfoundation.org/sites/events/files/slides/nakamura_20170831_1.pdf) [slides] | 282 | [2017: "Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel"](https://events.linuxfoundation.org/sites/events/files/slides/nakamura_20170831_1.pdf) [slides] |
| 273 | 283 | ||
| 274 | [2017: "Linux Kernel Self Protection Project" by Kees Cook](https://outflux.net/slides/2017/lss/kspp.pdf) [slides] | 284 | [2017: "Linux Kernel Self Protection Project" by Kees Cook](https://outflux.net/slides/2017/lss/kspp.pdf) [slides] |
| @@ -296,6 +306,14 @@ Pull requests are welcome. | |||
| 296 | 306 | ||
| 297 | ## Fuzzing & detectors | 307 | ## Fuzzing & detectors |
| 298 | 308 | ||
| 309 | [2017, Black Hat USA: "Evolutionary Kernel Fuzzing" by Richard Johnson](https://moflow.org/Presentations/Evolutionary%20Kernel%20Fuzzing-BH2017-rjohnson-FINAL.pdf) [slides] | ||
| 310 | |||
| 311 | [2017: "DIFUZE: Interface Aware Fuzzing for Kernel Drivers"](https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers-wp.pdf) [whitepaper] | ||
| 312 | |||
| 313 | [2017: "DIFUZE: Interface Aware Fuzzing for Kernel Drivers"](https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf) [slides] | ||
| 314 | |||
| 315 | [2017, CCS: "SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits"](https://acmccs.github.io/papers/p2139-youA.pdf) [whitepaper] | ||
| 316 | |||
| 299 | [2017, USENIX: "kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-schumilo.pdf) [whitepaper] | 317 | [2017, USENIX: "kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-schumilo.pdf) [whitepaper] |
| 300 | 318 | ||
| 301 | [2017, USENIX: "How Double-Fetch Situations turn into DoubleFetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-wang.pdf) [whitepaper] | 319 | [2017, USENIX: "How Double-Fetch Situations turn into DoubleFetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-wang.pdf) [whitepaper] |
| @@ -316,16 +334,16 @@ Pull requests are welcome. | |||
| 316 | 334 | ||
| 317 | [2015, Black Hat: "Don't Trust Your USB! How to Find Bugs in USB Device Drivers" by Sergej Schumilo, Ralf Spenneberg, and Hendrik Schwartke](https://www.youtube.com/watch?v=OAbzN8k6Am4) [video] | 335 | [2015, Black Hat: "Don't Trust Your USB! How to Find Bugs in USB Device Drivers" by Sergej Schumilo, Ralf Spenneberg, and Hendrik Schwartke](https://www.youtube.com/watch?v=OAbzN8k6Am4) [video] |
| 318 | 336 | ||
| 337 | [2012: "Comprehensive Kernel Instrumentation via Dynamic Binary Translation"](http://www.cs.toronto.edu/~peter/feiner_asplos_2012.pdf) [whitepaper] | ||
| 338 | |||
| 319 | [2010: "Automatic Bug-finding Techniques for Linux Kernel" by Jiri Slaby](https://www.fi.muni.cz/~xslaby/sklad/teze.pdf) [whitepaper] | 339 | [2010: "Automatic Bug-finding Techniques for Linux Kernel" by Jiri Slaby](https://www.fi.muni.cz/~xslaby/sklad/teze.pdf) [whitepaper] |
| 320 | 340 | ||
| 321 | 341 | ||
| 322 | ## Fuzzers | 342 | ## Fuzzers |
| 323 | 343 | ||
| 324 | https://github.com/kernelslacker/trinity | ||
| 325 | |||
| 326 | https://github.com/google/syzkaller | 344 | https://github.com/google/syzkaller |
| 327 | 345 | ||
| 328 | https://github.com/schumilo/vUSBf | 346 | https://github.com/kernelslacker/trinity |
| 329 | 347 | ||
| 330 | http://web.eece.maine.edu/~vweaver/projects/perf_events/fuzzer/ | 348 | http://web.eece.maine.edu/~vweaver/projects/perf_events/fuzzer/ |
| 331 | 349 | ||
| @@ -335,6 +353,10 @@ https://github.com/oracle/kernel-fuzzing | |||
| 335 | 353 | ||
| 336 | https://github.com/rgbkrk/iknowthis | 354 | https://github.com/rgbkrk/iknowthis |
| 337 | 355 | ||
| 356 | https://github.com/schumilo/vUSBf | ||
| 357 | |||
| 358 | https://github.com/ucsb-seclab/difuze | ||
| 359 | |||
| 338 | 360 | ||
| 339 | ## Exploits | 361 | ## Exploits |
| 340 | 362 | ||
| @@ -370,6 +392,8 @@ https://github.com/nongiach/CVE/tree/master/CVE-2017-5123 | |||
| 370 | 392 | ||
| 371 | http://seclists.org/fulldisclosure/2010/Sep/268 | 393 | http://seclists.org/fulldisclosure/2010/Sep/268 |
| 372 | 394 | ||
| 395 | https://github.com/hardenedlinux/offensive_poc | ||
| 396 | |||
| 373 | 397 | ||
| 374 | ## Practice | 398 | ## Practice |
| 375 | 399 | ||
| @@ -424,6 +448,10 @@ https://github.com/jondonas/linux-exploit-suggester-2 | |||
| 424 | 448 | ||
| 425 | https://github.com/mzet-/linux-exploit-suggester | 449 | https://github.com/mzet-/linux-exploit-suggester |
| 426 | 450 | ||
| 451 | https://github.com/spencerdodd/kernelpop | ||
| 452 | |||
| 453 | https://github.com/vnik5287/kaslr_tsx_bypass | ||
| 454 | |||
| 427 | 455 | ||
| 428 | ## Unsorted | 456 | ## Unsorted |
| 429 | 457 | ||
