diff options
| author | BitsByWill | 2021-08-27 12:11:51 -0700 |
|---|---|---|
| committer | Andrey Konovalov | 2021-08-28 18:31:49 +0200 |
| commit | 27671124395acb2c5d0871dd7754b7031fa2a1d2 (patch) | |
| tree | 9a8f58e12cc373a0e99edff40f88e41c5ac8483a /README.md | |
| parent | 22ea4d6639e8765da95a34ff3edfc715a7598dbc (diff) | |
add articles on using msg_msg for arb read/write
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 2 |
1 files changed, 2 insertions, 0 deletions
| @@ -45,6 +45,8 @@ Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified o | |||
| 45 | 45 | ||
| 46 | ### Exploitation | 46 | ### Exploitation |
| 47 | 47 | ||
| 48 | [2021: "Utilizing msg_msg Objects for Arbitrary Read and Arbitrary Write in the Linux Kernel"](https://www.willsroot.io/2021/08/corctf-2021-fire-of-salvation-writeup.html) [article] [[part2](https://syst3mfailure.io/wall-of-perdition)] | ||
| 49 | |||
| 48 | [2021: "Linux Kernel Exploitation Technique: Overwriting modprobe_path"](https://lkmidas.github.io/posts/20210223-linux-kernel-pwn-modprobe/) [article] | 50 | [2021: "Linux Kernel Exploitation Technique: Overwriting modprobe_path"](https://lkmidas.github.io/posts/20210223-linux-kernel-pwn-modprobe/) [article] |
| 49 | 51 | ||
| 50 | [2021: "Learning Linux Kernel Exploitation"](https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/) [article] [[part 2](https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/)] [[part 3](https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/)] | 52 | [2021: "Learning Linux Kernel Exploitation"](https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/) [article] [[part 2](https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/)] [[part 3](https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/)] |
