diff options
| author | 一之瀬 千夜 | 2024-08-24 16:04:36 +1000 |
|---|---|---|
| committer | Andrey Konovalov | 2024-08-24 16:08:01 +0200 |
| commit | 84431da2181bad2d7b0bbc0b8813263def4de043 (patch) | |
| tree | 3543790aff39cc84c175bde05a6dfba8ab4b68b1 /README.md | |
| parent | 7d8810cc2b3d2978040e069dc4df2c006010bae5 (diff) | |
Update README.md
Add "D^ 3CTF2023 d3kcache: From null-byte cross-cache overflow to infinite arbitrary read & write."
Diffstat (limited to '')
| -rw-r--r-- | README.md | 4 |
1 files changed, 4 insertions, 0 deletions
| @@ -62,6 +62,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 62 | 62 | ||
| 63 | [2024: "Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems"](https://arxiv.org/pdf/2401.17618.pdf) [paper] | 63 | [2024: "Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems"](https://arxiv.org/pdf/2401.17618.pdf) [paper] |
| 64 | 64 | ||
| 65 | [2023: "D^ 3CTF2023 d3kcache: From null-byte cross-cache overflow to infinite arbitrary read & write."](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/) [article] | ||
| 66 | |||
| 65 | [2023: "No Tux Given: Diving Into Contemporary Linux Kernel Exploitation" by sam4k](https://sam4k.com/content/files/2024/01/no_tux_given.pdf) [slides] | 67 | [2023: "No Tux Given: Diving Into Contemporary Linux Kernel Exploitation" by sam4k](https://sam4k.com/content/files/2024/01/no_tux_given.pdf) [slides] |
| 66 | 68 | ||
| 67 | [2023: "Linux Kernel Exploitation series" by santaclz](https://santaclz.github.io/2023/11/03/Linux-Kernel-Exploitation-Getting-started-and-BOF.html) [article] [[part2](https://santaclz.github.io/2024/01/20/Linux-Kernel-Exploitation-Heap-techniques.html)] [[part 3](https://santaclz.github.io/2024/01/29/Linux-Kernel-Exploitation-exploiting-race-condition-and-UAF.html)] | 69 | [2023: "Linux Kernel Exploitation series" by santaclz](https://santaclz.github.io/2023/11/03/Linux-Kernel-Exploitation-Getting-started-and-BOF.html) [article] [[part2](https://santaclz.github.io/2024/01/20/Linux-Kernel-Exploitation-Heap-techniques.html)] [[part 3](https://santaclz.github.io/2024/01/29/Linux-Kernel-Exploitation-exploiting-race-condition-and-UAF.html)] |
| @@ -1703,6 +1705,8 @@ HackTheBox (knote): [writeup](https://pwning.tech/knote/) | |||
| 1703 | 1705 | ||
| 1704 | RWCTF 2024 (RIPTC): [source](https://github.com/chaitin/Real-World-CTF-6th-Challenges/tree/main/RIPTC), [writeup](https://aslr.io/2024/02/04/rwctf-6th-riptc-write-up/), [writeup 2](https://github.com/N1ghtu/RWCTF6th-RIPTC) | 1706 | RWCTF 2024 (RIPTC): [source](https://github.com/chaitin/Real-World-CTF-6th-Challenges/tree/main/RIPTC), [writeup](https://aslr.io/2024/02/04/rwctf-6th-riptc-write-up/), [writeup 2](https://github.com/N1ghtu/RWCTF6th-RIPTC) |
| 1705 | 1707 | ||
| 1708 | D^3CTF 2023 (d3kcache): [writeup](https://blog.arttnba3.cn/2023/05/02/CTF-0X08_D3CTF2023_D3KCACHE/), [source](https://github.com/arttnba3/D3CTF2023_d3kcache) | ||
| 1709 | |||
| 1706 | Imaginary CTF 2023 (Windows of Opportunity): [writeup 1](https://francescolucarini.github.io/Windows-of-Opportunity/), [writeup 2](https://ctftime.org/writeup/37670) | 1710 | Imaginary CTF 2023 (Windows of Opportunity): [writeup 1](https://francescolucarini.github.io/Windows-of-Opportunity/), [writeup 2](https://ctftime.org/writeup/37670) |
| 1707 | 1711 | ||
| 1708 | corCTF 2023 (sysruption): [writeup](https://www.willsroot.io/2023/08/sysruption.html) | 1712 | corCTF 2023 (sysruption): [writeup](https://www.willsroot.io/2023/08/sysruption.html) |
