summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndrey Konovalov2017-12-17 23:43:07 +0100
committerGitHub2017-12-17 23:43:07 +0100
commit53ed07b2ad02ec22401d9a956a7a721253384429 (patch)
tree8a4fb61783db1c8eee7754a0c34a3eff1b1d801b
parentabb2d9cd45c9adea0cda030481ddb616a23a270a (diff)
Update README.md
-rw-r--r--README.md34
1 files changed, 31 insertions, 3 deletions
diff --git a/README.md b/README.md
index cc59975..4d987f4 100644
--- a/README.md
+++ b/README.md
@@ -12,6 +12,8 @@ Pull requests are welcome.
12 12
13## Exploitation techniques 13## Exploitation techniques
14 14
15[2017: "KERNELFAULT: Pwning Linux using Hardware Fault Injection" by Niek Timmers and Cristofaro Mune](https://www.youtube.com/watch?v=nqF_IjXg_uM) [video]
16
15[2017: "Kernel Driver mmap Handler Exploitation" by Mateusz Fruba](https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-mmap-exploitation-whitepaper-2017-09-18.pdf) [whitepaper] 17[2017: "Kernel Driver mmap Handler Exploitation" by Mateusz Fruba](https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-mmap-exploitation-whitepaper-2017-09-18.pdf) [whitepaper]
16 18
17[2017: "Linux kernel addr_limit bug / exploitation" by Vitaly Nikolenko](https://www.youtube.com/watch?v=UFakJa3t8Ls) [video] 19[2017: "Linux kernel addr_limit bug / exploitation" by Vitaly Nikolenko](https://www.youtube.com/watch?v=UFakJa3t8Ls) [video]
@@ -96,6 +98,12 @@ Pull requests are welcome.
96 98
97### LPE 99### LPE
98 100
101[2017: "The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel" by Di Shen](https://speakerdeck.com/retme7/the-art-of-exploiting-unconventional-use-after-free-bugs-in-android-kernel) [slides, CVE-2017-0403, CVE-2016-6787]
102
103[2017: "Exploiting CVE-2017-5123 with full protections. SMEP, SMAP, and the Chrome Sandbox!" by Chris Salls](https://salls.github.io/Linux-Kernel-CVE-2017-5123/) [article, CVE-2017-5123]
104
105[2017: "Exploiting CVE-2017-5123" by Federico Bento](https://reverse.put.as/2017/11/07/exploiting-cve-2017-5123/) [article, CVE-2017-5123]
106
99[2017: "Exploiting on CVE-2016-6787"](https://hardenedlinux.github.io/system-security/2017/10/16/Exploiting-on-CVE-2016-6787.html) [article, CVE-2016-6787] 107[2017: "Exploiting on CVE-2016-6787"](https://hardenedlinux.github.io/system-security/2017/10/16/Exploiting-on-CVE-2016-6787.html) [article, CVE-2016-6787]
100 108
101[2017: "Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit" by Alexander Popov](https://www.youtube.com/watch?v=g7Qm0NpPAz4) [video, CVE-2017-2636] 109[2017: "Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit" by Alexander Popov](https://www.youtube.com/watch?v=g7Qm0NpPAz4) [video, CVE-2017-2636]
@@ -269,6 +277,8 @@ Pull requests are welcome.
269 277
270## Defensive 278## Defensive
271 279
280[2017: "Towards Linux Kernel Memory Safety"](https://arxiv.org/pdf/1710.06175.pdf) [whitepaper]
281
272[2017: "Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel"](https://events.linuxfoundation.org/sites/events/files/slides/nakamura_20170831_1.pdf) [slides] 282[2017: "Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel"](https://events.linuxfoundation.org/sites/events/files/slides/nakamura_20170831_1.pdf) [slides]
273 283
274[2017: "Linux Kernel Self Protection Project" by Kees Cook](https://outflux.net/slides/2017/lss/kspp.pdf) [slides] 284[2017: "Linux Kernel Self Protection Project" by Kees Cook](https://outflux.net/slides/2017/lss/kspp.pdf) [slides]
@@ -296,6 +306,14 @@ Pull requests are welcome.
296 306
297## Fuzzing & detectors 307## Fuzzing & detectors
298 308
309[2017, Black Hat USA: "Evolutionary Kernel Fuzzing" by Richard Johnson](https://moflow.org/Presentations/Evolutionary%20Kernel%20Fuzzing-BH2017-rjohnson-FINAL.pdf) [slides]
310
311[2017: "DIFUZE: Interface Aware Fuzzing for Kernel Drivers"](https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers-wp.pdf) [whitepaper]
312
313[2017: "DIFUZE: Interface Aware Fuzzing for Kernel Drivers"](https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf) [slides]
314
315[2017, CCS: "SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits"](https://acmccs.github.io/papers/p2139-youA.pdf) [whitepaper]
316
299[2017, USENIX: "kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-schumilo.pdf) [whitepaper] 317[2017, USENIX: "kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-schumilo.pdf) [whitepaper]
300 318
301[2017, USENIX: "How Double-Fetch Situations turn into DoubleFetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-wang.pdf) [whitepaper] 319[2017, USENIX: "How Double-Fetch Situations turn into DoubleFetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel"](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-wang.pdf) [whitepaper]
@@ -316,16 +334,16 @@ Pull requests are welcome.
316 334
317[2015, Black Hat: "Don't Trust Your USB! How to Find Bugs in USB Device Drivers" by Sergej Schumilo, Ralf Spenneberg, and Hendrik Schwartke](https://www.youtube.com/watch?v=OAbzN8k6Am4) [video] 335[2015, Black Hat: "Don't Trust Your USB! How to Find Bugs in USB Device Drivers" by Sergej Schumilo, Ralf Spenneberg, and Hendrik Schwartke](https://www.youtube.com/watch?v=OAbzN8k6Am4) [video]
318 336
337[2012: "Comprehensive Kernel Instrumentation via Dynamic Binary Translation"](http://www.cs.toronto.edu/~peter/feiner_asplos_2012.pdf) [whitepaper]
338
319[2010: "Automatic Bug-finding Techniques for Linux Kernel" by Jiri Slaby](https://www.fi.muni.cz/~xslaby/sklad/teze.pdf) [whitepaper] 339[2010: "Automatic Bug-finding Techniques for Linux Kernel" by Jiri Slaby](https://www.fi.muni.cz/~xslaby/sklad/teze.pdf) [whitepaper]
320 340
321 341
322## Fuzzers 342## Fuzzers
323 343
324https://github.com/kernelslacker/trinity
325
326https://github.com/google/syzkaller 344https://github.com/google/syzkaller
327 345
328https://github.com/schumilo/vUSBf 346https://github.com/kernelslacker/trinity
329 347
330http://web.eece.maine.edu/~vweaver/projects/perf_events/fuzzer/ 348http://web.eece.maine.edu/~vweaver/projects/perf_events/fuzzer/
331 349
@@ -335,6 +353,10 @@ https://github.com/oracle/kernel-fuzzing
335 353
336https://github.com/rgbkrk/iknowthis 354https://github.com/rgbkrk/iknowthis
337 355
356https://github.com/schumilo/vUSBf
357
358https://github.com/ucsb-seclab/difuze
359
338 360
339## Exploits 361## Exploits
340 362
@@ -370,6 +392,8 @@ https://github.com/nongiach/CVE/tree/master/CVE-2017-5123
370 392
371http://seclists.org/fulldisclosure/2010/Sep/268 393http://seclists.org/fulldisclosure/2010/Sep/268
372 394
395https://github.com/hardenedlinux/offensive_poc
396
373 397
374## Practice 398## Practice
375 399
@@ -424,6 +448,10 @@ https://github.com/jondonas/linux-exploit-suggester-2
424 448
425https://github.com/mzet-/linux-exploit-suggester 449https://github.com/mzet-/linux-exploit-suggester
426 450
451https://github.com/spencerdodd/kernelpop
452
453https://github.com/vnik5287/kaslr_tsx_bypass
454
427 455
428## Unsorted 456## Unsorted
429 457