Source Byte
7.78K subscribers
863 photos
73 videos
680 files
1.71K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
DirtyCred (CVE-2022-3910) for container escape
Credits @starlabs_sg

starlabs.sg/blog/2023/07-a-n…

#Linux
,#kernel , #CVE_analysis
Interesting writeup on how to increase the chances to hit a race condition window in Linux kernel
Credits Google Project Zero

googleprojectzero.blogspot.c…


#linux , #race_condition , #white_paper
❤‍🔥1
exploiting a use-after-free in Linux kernel 5.15 (Ubuntu 22.04) (CVE-2022-32250)

credit: @saidelike

research.nccgroup.com/2022/0

#linux , #kernel , #analysis , #exploitation
__
@islemolecule_source
"GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems."

Link

#linux
#redteam
#lolbin
———
@islemolecule_source
👍3
Three parts series on debugging Linux kernel (gdb, kgdb, kgdboc and crash)

Part 1: blogs.oracle.com/linux/post/…
Part 2: blogs.oracle.com/linux/post/…
Part 3: blogs.oracle.com/linux/post/…

#linux
, #kernel , #debug ,
The Art of Linux Persistence.pdf.pdf
6.9 MB
5
Exploiting an io_uring Vulnerability in Ubuntu
This post discusses a use-after-free vulnerability, CVE-2024-0582, in io_uring in the Linux kernel. Despite the vulnerability being patched in the stable kernel in December 2023, it wasn’t ported to Ubuntu kernels for over two months, making it an easy 0day vector in Ubuntu during that time.


https://blog.exodusintel.com/2024/03/27/mind-the-patch-gap-exploiting-an-io_uring-vulnerability-in-ubuntu/

#cve_analysis , #linux_internals , #CVE-2024-0582
👍3
Forwarded from Stuff for Geeks (rВНm)
👍32
Forwarded from reconcore
This media is not supported in your browser
VIEW IN TELEGRAM
CobaltStrike-Linux-Beacon
Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons

#poc #beacon #linux @reconcore
👍3👎1