Category Security

26.10.2021 - link drop

Breaking the News: New York Times Journalist Ben Hubbard Hacked with Pegasus after Reporting on Previous Hacking Attempts - The Citizen Lab

Faceboom

You may or may not have heard from the ‘Slashdot effect’[0].

Kernel Exploitation Part Six

This post is the sixth and last part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Five

This post is the five part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Four

This post is the fourth part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Three

This post is the third part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Two

This is the secound part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part One

This post reflects my notes and additional thoughts about the first lecture about kernel exploitation of pwn.

Kernel Exploitation Sidenotes

Because I already knew a bit of hardware-related operation and you often find code statements like the following:

Kernel Exploitation Intro

One of my plans was to learn about security[0]. My ToDo list is massively full of different topics I want to put some attention on.