Category Security
Faceboom
You may or may not have heard from the ‘Slashdot effect’[0].
Kernel Exploitation Part Six
This post is the sixth and last part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Five
This post is the five part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Four
This post is the fourth part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Three
This post is the third part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Two
This is the secound part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part One
This post reflects my notes and additional thoughts about the first lecture about kernel exploitation of pwn.
Kernel Exploitation Sidenotes
Because I already knew a bit of hardware-related operation and you often find code statements like the following:
Kernel Exploitation Intro
One of my plans was to learn about security[0]. My ToDo list is massively full of different topics I want to put some attention on.
Generic Software is an attack avenue
As you may or may not know, one quite big hack went through the media lately, Solar Wind[0][1].