Linking pages
- SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250) – NCC Group Research https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/ 1 comment
- GitHub - bsauce/kernel-exploit-factory: Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore. https://github.com/bsauce/kernel-exploit-factory 1 comment
- GitHub - xairy/linux-kernel-exploitation: A collection of links related to Linux kernel security and exploitation https://github.com/xairy/linux-kernel-exploitation 0 comments
Linked pages
- Project Zero: Exploiting the Linux kernel via packet sockets https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html 38 comments
- Physical Page Allocation https://www.kernel.org/doc/gorman/html/understand/understand009.html 3 comments
- Will's Root: corCTF 2021 Fire of Salvation Writeup: Utilizing msg_msg Objects for Arbitrary Read and Arbitrary Write in the Linux Kernel https://www.willsroot.io/2021/08/corctf-2021-fire-of-salvation-writeup.html 2 comments
- Will's Root: CVE-2022-0185 - Winning a $31337 Bounty after Pwning Ubuntu and Escaping Google's KCTF Containers https://www.willsroot.io/2022/01/cve-2022-0185.html 0 comments
- kernel-exploitation/cve-2021-32606.md at main · nrb547/kernel-exploitation · GitHub https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-32606/cve-2021-32606.md 0 comments
Related searches:
Search whole site: site:etenal.me
Search title: CVE-2022-27666: Exploit esp6 modules in Linux kernel - ETenal
See how to search.