Pwn学习总结(28):Kernel Pwn – 内核环境配置与KROP_LPE题目准备

由于个人需求,需要入门Kernel Pwn。所以又继续开始更新这个系列啦!

我的入门参考了Keith Makan的Kernel Pwn系列文章:
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
[Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel
[Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow

但我只能说,这系列文章的写作质量非常感人。第一篇文章写的还是比较优秀的,后面作者就开始放飞自我了。在一些关键的地方会出现不能看的错误。因此我自己再写一篇踩坑教程。

继续阅读

Pwn学习总结(27):SmallBin – playthenew

实验环境:

x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5

实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/playthenew

ELF安全性:

    Arch:     amd64-64-little
    RELRO:    Full RELRO
    Stack:    Canary found
    NX:       NX enabled
    PIE:      PIE enabled

继续阅读

Pwn学习总结(26):TCache – tcache231

实验环境:

x86_64, Ubuntu 20.04.4 LTS, Kernel 5.13.0-37-generic
GLIBC 2.31-0ubuntu9.8

实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/TCache/tcache231

ELF安全性:

    Arch:     amd64-64-little
    RELRO:    Partial RELRO
    Stack:    Canary found
    NX:       NX enabled
    PIE:      No PIE (0x400000)

继续阅读

Pwn学习总结(25):_IO_FILE – io_leak

实验平台:

x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5

实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/IO_FILE/io_leak

ELF安全性:

    Arch:     amd64-64-little
    RELRO:    Full RELRO
    Stack:    Canary found
    NX:       NX enabled
    PIE:      PIE enabled

amd64体系结构,保护全开。

继续阅读