An open API service indexing awesome lists of open source software.

https://github.com/lazenca/kernel-exploit-tech

Linux Kernel exploitation Tutorial.
https://github.com/lazenca/kernel-exploit-tech

kernel-exploit kernel-exploitation linux-kernel linux-kernel-hacking tutorial-exercises tutorials

Last synced: about 2 months ago
JSON representation

Linux Kernel exploitation Tutorial.

Awesome Lists containing this project

README

        

# Linux Kernel exploitation Tutorial.
Hi, I am Lazneca.0x0

These files are the example files used at "https://www.lazenca.net/display/TEC/07.Linux+Kernel". I hope that I will be able to use the text that I wrote and these files to help people who are new to Hacking's exploit technology to understand the technology a little easier.

All my writings are written in Korean. If someone can translate the contents on my site in English. Please help me.
## Site
* Web site : https://www.lazenca.net/
* Facebook: https://www.facebook.com/Lazenca.0x0/
## Basic exploit techniques.
* [Basic exploit techniques](https://github.com/Lazenca/Exploit-tech)
## Tutorial list
### 01.Development of Kernel Module
* [01.Hello world!](https://www.lazenca.net/pages/viewpage.action?pageId=23789735)
* [02.Character Device Drivers](https://www.lazenca.net/display/TEC/02.Character+Device+Drivers)
* [03.ioctl(Input/Output control)](https://www.lazenca.net/pages/viewpage.action?pageId=23789739)
* [04.Creating a kernel module to privilege escalation](https://www.lazenca.net/display/TEC/04.Creating+a+kernel+module+to+privilege+escalation)
### [02.Debugging kernel and modules](https://www.lazenca.net/display/TEC/02.Debugging+kernel+and+modules)
### 03.Linux Kernel Exploitation Tutorial
* [01.Stack smashing(32bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=23789706)
* [02.Stack smashing(64bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624684)
* [03.Stack smashing(64bit) & ROP](https://www.lazenca.net/pages/viewpage.action?pageId=25624746)
* [04.Write-what-where(Arbitrary Memory Overwrite)(feat.ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624658)
* [05.Null pointer dereference(32bit & 64bit)](https://www.lazenca.net/pages/viewpage.action?pageId=25624632)
* [06.Use-After-Free(UAF) (feat.struct cred)](https://www.lazenca.net/pages/viewpage.action?pageId=25624864)
* [07.Use-After-Free(UAF) (feat.tty_struct)](https://www.lazenca.net/pages/viewpage.action?pageId=29327365)
* [08.ret2dir(return-to-direct-mapped memory)](https://www.lazenca.net/pages/viewpage.action?pageId=25624881)
### 04.Kernel Self-Protection
* [01.Kernel Address Space Layout Randomization (KASLR)](https://www.lazenca.net/pages/viewpage.action?pageId=25624857)
* [02.Segregation of kernel memory from userspace memory(x86's SMEP/SMAP, ARM's PXN/PAN)](https://www.lazenca.net/pages/viewpage.action?pageId=25624859)