https://github.com/lazenca/kernel-exploit-tech
Linux Kernel exploitation Tutorial.
https://github.com/lazenca/kernel-exploit-tech
kernel-exploit kernel-exploitation linux-kernel linux-kernel-hacking tutorial-exercises tutorials
Last synced: about 2 months ago
JSON representation
Linux Kernel exploitation Tutorial.
- Host: GitHub
- URL: https://github.com/lazenca/kernel-exploit-tech
- Owner: Lazenca
- License: gpl-3.0
- Created: 2019-04-23T12:25:46.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2020-06-30T02:27:38.000Z (almost 5 years ago)
- Last Synced: 2025-05-08T21:16:29.732Z (about 2 months ago)
- Topics: kernel-exploit, kernel-exploitation, linux-kernel, linux-kernel-hacking, tutorial-exercises, tutorials
- Language: C
- Homepage: https://www.lazenca.net
- Size: 3.46 MB
- Stars: 268
- Watchers: 13
- Forks: 35
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Linux Kernel exploitation Tutorial.
Hi, I am Lazneca.0x0These files are the example files used at "https://www.lazenca.net/display/TEC/07.Linux+Kernel". I hope that I will be able to use the text that I wrote and these files to help people who are new to Hacking's exploit technology to understand the technology a little easier.
All my writings are written in Korean. If someone can translate the contents on my site in English. Please help me.
## Site
* Web site : https://www.lazenca.net/
* Facebook: https://www.facebook.com/Lazenca.0x0/
## Basic exploit techniques.
* [Basic exploit techniques](https://github.com/Lazenca/Exploit-tech)
## Tutorial list
### 01.Development of Kernel Module
* [01.Hello world!](https://www.lazenca.net/pages/viewpage.action?pageId=23789735)
* [02.Character Device Drivers](https://www.lazenca.net/display/TEC/02.Character+Device+Drivers)
* [03.ioctl(Input/Output control)](https://www.lazenca.net/pages/viewpage.action?pageId=23789739)
* [04.Creating a kernel module to privilege escalation](https://www.lazenca.net/display/TEC/04.Creating+a+kernel+module+to+privilege+escalation)
### [02.Debugging kernel and modules](https://www.lazenca.net/display/TEC/02.Debugging+kernel+and+modules)
### 03.Linux Kernel Exploitation Tutorial
* [01.Stack smashing(32bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=23789706)
* [02.Stack smashing(64bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624684)
* [03.Stack smashing(64bit) & ROP](https://www.lazenca.net/pages/viewpage.action?pageId=25624746)
* [04.Write-what-where(Arbitrary Memory Overwrite)(feat.ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624658)
* [05.Null pointer dereference(32bit & 64bit)](https://www.lazenca.net/pages/viewpage.action?pageId=25624632)
* [06.Use-After-Free(UAF) (feat.struct cred)](https://www.lazenca.net/pages/viewpage.action?pageId=25624864)
* [07.Use-After-Free(UAF) (feat.tty_struct)](https://www.lazenca.net/pages/viewpage.action?pageId=29327365)
* [08.ret2dir(return-to-direct-mapped memory)](https://www.lazenca.net/pages/viewpage.action?pageId=25624881)
### 04.Kernel Self-Protection
* [01.Kernel Address Space Layout Randomization (KASLR)](https://www.lazenca.net/pages/viewpage.action?pageId=25624857)
* [02.Segregation of kernel memory from userspace memory(x86's SMEP/SMAP, ARM's PXN/PAN)](https://www.lazenca.net/pages/viewpage.action?pageId=25624859)