Revisiting CVE-2017-11176 with another Data-Only Attack (CFI 4/4)
Originally exploited by LEXFO, we’ll convert it into a data-only attack by overwriting an in-memory Linux configuration setting (core_pattern), gaining root ...
Originally exploited by LEXFO, we’ll convert it into a data-only attack by overwriting an in-memory Linux configuration setting (core_pattern), gaining root ...
Originally exploited by Google Project Zero, we’ll convert it into a data-only attack by overwriting the task’s creds to gain root access.
Building a data-only exploit from scratch, from an out-of-bounds bug. We’ll cover heap grooming, privilege escalation, and more.
Exploring how Control-Flow Integrity works in the Linux kernel, why it helps, and where it still falls short, especially against data-only attacks.