实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/ROP/KROP_LPE
内核安全性:
- KASLR:关闭
- Stack Canary:关闭
- FORTIFY_SOURCE:关闭
- SMEP/SMAP:开启
- KPTI:开启
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/ROP/KROP_LPE
内核安全性:
由于个人需求,需要入门Kernel Pwn。所以又继续开始更新这个系列啦!
我的入门参考了Keith Makan的Kernel Pwn系列文章:
– [Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
– [Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel
– [Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow
但我只能说,这系列文章的写作质量非常感人。第一篇文章写的还是比较优秀的,后面作者就开始放飞自我了。在一些关键的地方会出现不能看的错误。因此我自己再写一篇踩坑教程。
排名及奖金如下:
排名及用户名 | 分数 | 奖金数额 | 领取状态 |
---|---|---|---|
1 bml | 456 | 84.56 | Y |
2 xtex | 415 | 39.15 | Y |
3 QY | 396 | 38.96 | Y |
4 Yuzhen | 366 | 19.66 | Y |
5 FlyingSky | 366 | 18.66 | Y |
6 undefined | 296 | 8.96 | Y |
7 morty | 296 | 7.96 | |
8 predit | 215 | 7.15 | |
9 ricky8955555 | 166 | 6.66 | Y |
10 Sakii | 67 | 5.67 |
实验环境:
x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/playthenew
ELF安全性:
Arch: amd64-64-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
实验环境:
x86_64, Ubuntu 20.04.4 LTS, Kernel 5.13.0-37-generic
GLIBC 2.31-0ubuntu9.8
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/TCache/tcache231
ELF安全性:
Arch: amd64-64-little
RELRO: Partial RELRO
Stack: Canary found
NX: NX enabled
PIE: No PIE (0x400000)
实验平台:
x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/IO_FILE/io_leak
ELF安全性:
Arch: amd64-64-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
amd64体系结构,保护全开。
实验平台:
x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/TCache/tcache
实验平台:
x86_64, Ubuntu 16.04.7 LTS, Kernel 4.15.0-142-generic
GLIBC 2.23-0ubuntu11.3
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/bookwriter
实验平台:
x86_64, Ubuntu 16.04.7 LTS, Kernel 4.15.0-142-generic
GLIBC 2.23-0ubuntu11.3
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/unsorted_bin
实验平台:
x86_64, Ubuntu 16.04.7 LTS, Kernel 4.15.0-142-generic
GLIBC 2.23-0ubuntu11.3
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/offbyone