video thumbnail 15:22
Kernel Root Exploit via a ptrace() and execve() Race Condition

2021-01-10

[public] 77.0K views, 6.40K likes, 33.0 dislikes audio only

channel thumbLiveOverflow

Let's have a look at a recent kernel local privilege escalation exploit!

Exploit Source: https://hxp.io/blog/79/hxp-CTF-2020-wisdom2/

Kernel Developer Walkthrough: https://www.youtube.com/watch?v=LORxdO1XUjY

Syscalls, Kernel vs. User Mode and Linux Kernel Source Code: /youtube/video/fLS99zJDHOc

How Do Linux Kernel Drivers Work? /youtube/video/juGNPLdjLH4

šŸ‘• T-Shirt Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjwy6HCzLfwNzdrSrcrLOM4d

00:00 - Introduction

00:15 - Exploit PoC

00:39 - main()

00:52 - prepare_shellcode()

02:39 - mmap() shared memory to signal "ready" state

03:07 - fork() into [child] and [parent]

03:44 - [parent] wait for the child

04:00 - [child] unveil() loop

05:03 - [parent] ptrace ATTACH and POKE child

05:58 - [child] execve("passwd")

06:38 - [parent] PEEK entrypoint of child in loop

07:34 - [parent] child entrypoint changes!

07:49 - Exploit Walkthrough

09:20 - Root Shell via Shellcode

10:10 - Vulnerability Summary

10:37 - Which UNIX-like Kernel is this?

12:44 - The importance for Security Research

13:59 - Next Video and Resources

14:22 - Patreon and YT Members

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ šŸ“„ P.S. ]=-

All links with "*" are affiliate links.

LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.


SerenityOS exploit analysis: HXP CTF 2020 #1 (and let's fix it too!) by Andreas Kling
youtube.com/watch?v=LORxdO1XUjY
Introduction
/youtube/video/qUh507Na9nk?t=0
Exploit PoC
/youtube/video/qUh507Na9nk?t=15
main()
/youtube/video/qUh507Na9nk?t=39
prepare_shellcode()
/youtube/video/qUh507Na9nk?t=52
mmap() shared memory to signal "ready" state
/youtube/video/qUh507Na9nk?t=159
fork() into [child] and [parent]
/youtube/video/qUh507Na9nk?t=187
[parent] wait for the child
/youtube/video/qUh507Na9nk?t=224
[child] unveil() loop
/youtube/video/qUh507Na9nk?t=240
[parent] ptrace ATTACH and POKE child
/youtube/video/qUh507Na9nk?t=303
[child] execve("passwd")
/youtube/video/qUh507Na9nk?t=358
[parent] PEEK entrypoint of child in loop
/youtube/video/qUh507Na9nk?t=398
[parent] child entrypoint changes!
/youtube/video/qUh507Na9nk?t=454
Exploit Walkthrough
/youtube/video/qUh507Na9nk?t=469
Root Shell via Shellcode
/youtube/video/qUh507Na9nk?t=560
Vulnerability Summary
/youtube/video/qUh507Na9nk?t=610
Which UNIX-like Kernel is this?
/youtube/video/qUh507Na9nk?t=637
The importance for Security Research
/youtube/video/qUh507Na9nk?t=764
Next Video and Resources
/youtube/video/qUh507Na9nk?t=839
Patreon and YT Members
/youtube/video/qUh507Na9nk?t=862
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
I’m moving, no videos sorry 17,545 views
/youtube/video/9CS3q0uG1LI
Patreon patreon.com
https://www.patreon.com/join/liveoverflow
Explaining Dirty COW local root exploit - CVE-2016-5195 228,066 views
/youtube/video/kEsshExn7aE