No edit summary |
No edit summary |
||
| Line 6: | Line 6: | ||
|Start=19:00 | |Start=19:00 | ||
|Duration=4 | |Duration=4 | ||
|Host=Barbieauglend, | |Host=Barbieauglend, wirklichniemand | ||
|isRelevant=Yes | |isRelevant=Yes | ||
}} | }} | ||
| Line 16: | Line 16: | ||
==Mentors== | ==Mentors== | ||
*{{U|barbieauglend}} | * {{U|barbieauglend}} | ||
* {{U|wirklichniemand}} | |||
==Reading Materials== | ==Reading Materials== | ||
Latest revision as of 22:42, 30 May 2023
| Security foo | |
|---|---|
| ROP and kernel debugging - Pre-work | |
| Art | Meet-Up |
| Datum | 2023-05-22 |
| Start | 19:00 |
| Dauer | 4h |
| Host | Barbieauglend |
| Relevant? | Yes |
ROP[edit | edit source]
We continue on our journey of exploiting the Linux kernel - now we are going to review and build our ROP chain and setup our environment for kernel debugging :)
I am going to be online between 20-20:30 (8:00 - 8:30pm)
- md.chaosdorf.de/security-foo
Mentors[edit | edit source]
Reading Materials[edit | edit source]
Pre-work for kernel debug:
- blog.packagecloud.io/how-to-extract-and-disassmble-a-linux-kernel-image-vmlinuz/
- www.golinuxcloud.com/systemtap-tutorial-linux-example/
- cscope.sourceforge.net/cscope_vim_tutorial.html
Pre-work for ROP chain:
- github.com/JonathanSalwan/ROPgadget