this post was submitted on 07 Dec 2023
2 points (100.0% liked)

Security Operations

570 readers
1 users here now

A place for all things Cyber Security, from questions, rants, and stories, to the latest attacks, vulnerabilities, and zero days.

founded 1 year ago
MODERATORS
L3s
 

Cueing up a calculator: an introduction to exploit development on Linux::Using CVE-2023-43641 as an example, I’ll explain how to develop an exploit for a memory corruption vulnerability on Linux. The exploit has to bypass several mitigations to achieve code execution.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here