实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/ROP/KROP_LPE
内核安全性:
- KASLR:关闭
- Stack Canary:关闭
- FORTIFY_SOURCE:关闭
- SMEP/SMAP:开启
- KPTI:开启
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/ROP/KROP_LPE
内核安全性:
由于个人需求,需要入门Kernel Pwn。所以又继续开始更新这个系列啦!
我的入门参考了Keith Makan的Kernel Pwn系列文章:
– [Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
– [Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel
– [Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow
但我只能说,这系列文章的写作质量非常感人。第一篇文章写的还是比较优秀的,后面作者就开始放飞自我了。在一些关键的地方会出现不能看的错误。因此我自己再写一篇踩坑教程。
实验环境:
x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/playthenew
ELF安全性:
Arch: amd64-64-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
实验环境:
x86_64, Ubuntu 20.04.4 LTS, Kernel 5.13.0-37-generic
GLIBC 2.31-0ubuntu9.8
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/TCache/tcache231
ELF安全性:
Arch: amd64-64-little
RELRO: Partial RELRO
Stack: Canary found
NX: NX enabled
PIE: No PIE (0x400000)
实验平台:
x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/IO_FILE/io_leak
ELF安全性:
Arch: amd64-64-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
amd64体系结构,保护全开。
实验平台:
x86_64, Ubuntu 18.04.6 LTS, Kernel 4.15.0-170-generic
GLIBC 2.27-3ubuntu1.5
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/TCache/tcache
实验平台:
x86_64, Ubuntu 16.04.7 LTS, Kernel 4.15.0-142-generic
GLIBC 2.23-0ubuntu11.3
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/bookwriter
实验平台:
x86_64, Ubuntu 16.04.7 LTS, Kernel 4.15.0-142-generic
GLIBC 2.23-0ubuntu11.3
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/unsorted_bin
实验平台:
x86_64, Ubuntu 16.04.7 LTS, Kernel 4.15.0-142-generic
GLIBC 2.23-0ubuntu11.3
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/OtherBin/offbyone
实验平台:
x86_64, Ubuntu 16.04.7 LTS, Kernel 4.15.0-142-generic
GLIBC 2.23-0ubuntu11.3
实验Binary及答案:https://github.com/bjrjk/pwn-learning/tree/main/Unlink/offbyone_unlink