(Kernel Security) level 4
Information category: pwn Description Ease into kernel exploitation with another crackme level and learn how kernel devices communicate. Explit I think I should try to get Hacker rank ...
Information category: pwn Description Ease into kernel exploitation with another crackme level and learn how kernel devices communicate. Explit I think I should try to get Hacker rank ...
Information category: pwn Description Ease into kernel exploitation with another crackme level, this time with some privilege escalation (whoami?). Explit Call win function by send cor...
Information category: pwn Description Ease into kernel exploitation with another crackme level. Explit Another copy-paste scheme level U_u. #include <fcntl.h> #include <stdio...
Information category: pwn Description Ease into kernel exploitation with this simple crackme level! Explit Just We need to look at module challenge using ghidra then find the correct p...
Information category: pwn Description Apply FILE struct exploits to write data and hijack control flow. Explit RIP future me reading this exploit with no comments 0-0 #!/usr/bin/env pyth...
Information category: pwn Description Apply FILE struct exploits to write data to bypass a security check. Exploit #!/usr/bin/env python3 from pwn import * exe = ELF("./babyfile_level1...
Information category: pwn Description Apply FILE struct exploits to leak a secret value. Explit from pwn import * elf = context.binary = ELF("/challenge/babyfile_level11") global p p = e...
Information category: pwn Description Create a fake _wide_data struct to hijack control of the virtual function table of a built-in FILE struct. from pwn import * elf = context.binary =...
Information category: pwn Description Create a fake _wide_data struct to hijack control of the virtual function table of a FILE struct. Write-up Since when program jump into __GI__IO_da...
Information category: pwn Description Harness the power of FILE structs to arbitrarily write data to bypass a security check. Write-up same previous but now in write. Exploit from pwn im...