(Adding links to the last meet-up) |
No edit summary |
||
Line 6: | Line 6: | ||
|Start=19:00 | |Start=19:00 | ||
|Duration=4 | |Duration=4 | ||
|Host=Barbieauglend | |Host=Barbieauglend, wirklichniemanden | ||
|isRelevant=Yes | |isRelevant=Yes | ||
}} | }} |
Revision as of 23:41, 30 May 2023
Security foo | |
---|---|
ROP and kernel debugging - Pre-work | |
Art | Meet-Up |
Datum | 2023-05-22 |
Start | 19:00 |
Dauer | 4h |
Host | Barbieauglend, wirklichniemanden |
Relevant? | Yes |
ROP
We continue on our journey of exploiting the Linux kernel - now we are going to review and build our ROP chain and setup our environment for kernel debugging :)
I am going to be online between 20-20:30 (8:00 - 8:30pm)
- md.chaosdorf.de/security-foo
Mentors
Reading Materials
Pre-work for kernel debug:
- blog.packagecloud.io/how-to-extract-and-disassmble-a-linux-kernel-image-vmlinuz/
- www.golinuxcloud.com/systemtap-tutorial-linux-example/
- cscope.sourceforge.net/cscope_vim_tutorial.html
Pre-work for ROP chain:
- github.com/JonathanSalwan/ROPgadget