Security-foo/2023-06-05

= ROP =

We continue on our journey of exploiting the Linux kernel - now we are going to review and build our ROP chain and setup our environment for kernel debugging :)

Please install the tools and test them beforehand !


 * md.chaosdorf.de/security-foo

Reading Materials
Pre-work for kernel debug:


 * blog.packagecloud.io/how-to-extract-and-disassmble-a-linux-kernel-image-vmlinuz/ - For getting the linux kernel binary image
 * www.golinuxcloud.com/systemtap-tutorial-linux-example/ - To get started with `systemtap`
 * cscope.sourceforge.net/cscope_vim_tutorial.html - no help navigate C code from vim

Pre-work for ROP chain:


 * github.com/JonathanSalwan/ROPgadget - to get a list of ROP gadgets from our binary