Friday, July 26, 2019

hack folder hack escalation privileges (modify value char to zero amd64 kernel )


SMEP:
An abbreviation for Supervisor Mode Execution Prevention, when running on ring zero, execution would not be allowed to be transmitted to user-space. So both SMEP and SMAP put a form of limitation on the attacker’s surface.
static __init int setup_disable_smep(char *arg)
{
setup_clear_cpu_cap(X86_FEATURE_SMEP);
check_mpx_erratum(&boot_cpu_data);
return 1;
}
__setup("nosmep", setup_disable_smep);
Knowing if it’s on is as simple as checking /proc/cpuinfo, and it’s the same for SMAP.
This protection can be disabled with nosmep boot flag, it can also be disabled during runtime by unsetting SMEP bit(#20) on CR4.
https://0x00sec.org/t/point-of-no-c3-linux-kernel-exp…/11585
0X00SEC.ORG
In the name of Allah, the most beneficent, the most merciful. HAHIRRITATEDAHAHAHAHAHAHAHA “Appreciate the art, master the craft.” AHAHAHAHOUTDATEDAHAHAHAHAH It’s been more than a year, huh? but I’m back, with “Point of no C3”. It’s main focus will be Kernel Exploitation, but that won.....

No comments:

US Politics intel donald trump heart attacks (BACK@WAR trump´s heart attacks history @CIA but this time he´s done)

  https://edition.cnn.com/2018/01/17/health/trump-heart-disease-gupta/index.html https://thehill.com/homenews/administration/514637-white-ho...