Linux Kernel Exploitation - BOF (part1)

First exploitation of a buffer overflow flaw in a vulnerable device, explanation of the ret2usr technique + demonstration

World of kernel in pwn

Introduction to binary exploitation in Kernel Land, explanation of the basic principles to perform pwn in kernel land and CTF

Posted on Sat, Jul 31, 2021 Kernel Land PWN Binary Exploitation Linux Kernel kernel