Reading Kernel Source Code - Analysis of an Exploit

Reading Kernel Source Code - Analysis of an Exploit

this SSH exploit is absolutely wildПодробнее

this SSH exploit is absolutely wild

37C3 - Operation Triangulation: What You Get When Attack iPhones of ResearchersПодробнее

37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers

37C3 - Writing secure softwareПодробнее

37C3 - Writing secure software

#HITB2021SIN D1T1 - Exploiting UAF By Ret2bpf In Android Kernel - Xingyu Jin & Richard NealПодробнее

#HITB2021SIN D1T1 - Exploiting UAF By Ret2bpf In Android Kernel - Xingyu Jin & Richard Neal

new vulnerability in your motherboard lasts foreverПодробнее

new vulnerability in your motherboard lasts forever

OpenSSH backdoor'ed via XZ & Systemd on RedHat & Debian systemd: multi-year effort by state actor?Подробнее

OpenSSH backdoor'ed via XZ & Systemd on RedHat & Debian systemd: multi-year effort by state actor?

DEFCON 19: Kernel Exploitation Via Uninitialized StackПодробнее

DEFCON 19: Kernel Exploitation Via Uninitialized Stack

SerenityOS exploit analysis: braindeadПодробнее

SerenityOS exploit analysis: braindead

OS hacking: Let's exploit ELF symbolication to read kernel memory!Подробнее

OS hacking: Let's exploit ELF symbolication to read kernel memory!

DEF CON 26 - Bai and Zheng - Analyzing and Attacking Apple Kernel DriversПодробнее

DEF CON 26 - Bai and Zheng - Analyzing and Attacking Apple Kernel Drivers

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL ExploitsПодробнее

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits