People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
memcpy with a user controlled size and buffer. Because the buffer is static, this leads to a classic buffer overflow on the stack! Using this vulnerability, RIP can be overwritten, resulting in complete compromise of the device. / directory. mmap syscall is used in order to load code in prior to executing a file. When loading a binary with MMAP_SHARED (which is common so that memory can be shared), the memory is writable, if loaded.mmap syscall. cp (yes, like in Unix terminals) is command to copy files. This same command can be used to transfer files between host and containers. In recent years, lots of issues have came up in containers because of this command.docker cp loading libraries at runtime for this command. By using chroot to go into the container directory for the copy, it prevents symbolic links. But, the dynamically loaded libraries are loaded within the container!/proc must be used. This is extremely annoying and tedious to work with.ptrace_scope.CAP_SYS_PTRACE capability. fbgames://. By design, this could be used to load an arbitrary exe on the system, but was stopped by a dialog for the user to click. com.palm, com.webos and com.lge.). To me, this looks extra permissive. From researching the setuid binaries, one of the CLI tools had a prefix with this package name!cmd.exe