People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
AppArmor is a Linux kernel security module that allows the system to restrict the capabilities on a per-profile basis. AppArmor. The profile for the synosearchagent profile did not restrict access to loading kernel modules. Now, by using the insmod command it is trivial to run code inside of the kernel. dbutil_2_3.sys) and found several vulnerabilities in it. memmove an arbitrary read/write vulnerability has been given to the user. Damn! git_diff repository to see how the merge functionality worked. git_diff added file information for where to write the file to directly into the file! With this in mind, it was possible to make a 0 line change PR that could overwrite a Ruby file in Homebrew itself. git_diff. Instead, it was using the code in an unattended way; the authors of git_diff never expected an attacker to be able to control the file information when writing the tool. Overall, interesting finding where the issue is with the integration of technology. limit exceeded error, this limit could be bypassed using concurrent request via Burp Turbo. NXP LPC55S69 ROM they found an interesting piece of undocumented functionality that allowed them to update the ROM. Sadly (or good for attackers), this code is accessible by non-secure, unprivileged user code thus allowing attackers to make runtime modifications to purportedly trusted APIs.Packagist in order to get the metadata for the package. In order to do this, Composer uses several system commands by using ProcessExecutor so that they do not need to redo the logic for different version control software, such as git.hg version control code. This configuration can have bash aliases defined in it (lolz). With this, we can create an alias to pop a shell :)