Original post by w1sdom, from the 0x00sec forum.
In this example, we will perform one of the basic kernel exploitation techniques which is essentially an arbitrary write (write-what-where). This vulnerability occurs when a
About two weeks ago I completed an internal pentest structured as a purple team exercise. I conducted the attacks while the client’s SOC monitored for visibility gaps in real time. The environment
Original by Magnus on the forum.
Most beginners get lost when it comes to exploiting the heap. That’s because there are a lot of techniques that differ depending on the glibc version and other variables, making them want to throw their computer in the trash.
But it’s not really that complicated.
Keeping the old 0x00sec tradition alive, 0x00pico has dropped a new crypto / reverse challenge.
It's a Linux x86_64 binary and the goal is straightforward: recover the password and get access.
Bring Your Own Vulnerable Device (BYOVD) is a technique used in red teaming that allows users to perform kernel-level actions by exploiting a vulnerable, legitimately signed kernel device driver.
Drivers run in ring