No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
|Start=19:00 | |Start=19:00 | ||
|Duration=4 | |Duration=4 | ||
|Host=Barbieauglend, | |Host=Barbieauglend, wirklichniemand | ||
|isRelevant=Yes | |isRelevant=Yes | ||
}} | }} | ||
Line 16: | Line 16: | ||
==Mentors== | ==Mentors== | ||
*{{U|barbieauglend}} | * {{U|barbieauglend}} | ||
* {{U|wirklichniemand}} | |||
==Reading Materials== | ==Reading Materials== |
Latest revision as of 23:42, 30 May 2023
Security foo | |
---|---|
ROP and kernel debugging - Pre-work | |
Art | Meet-Up |
Datum | 2023-05-22 |
Start | 19:00 |
Dauer | 4h |
Host | Barbieauglend, wirklichniemand |
Relevant? | Yes |
ROP[edit | edit source]
We continue on our journey of exploiting the Linux kernel - now we are going to review and build our ROP chain and setup our environment for kernel debugging :)
I am going to be online between 20-20:30 (8:00 - 8:30pm)
- md.chaosdorf.de/security-foo
Mentors[edit | edit source]
Reading Materials[edit | edit source]
Pre-work for kernel debug:
- blog.packagecloud.io/how-to-extract-and-disassmble-a-linux-kernel-image-vmlinuz/
- www.golinuxcloud.com/systemtap-tutorial-linux-example/
- cscope.sourceforge.net/cscope_vim_tutorial.html
Pre-work for ROP chain:
- github.com/JonathanSalwan/ROPgadget