Description
This project focuses on discovering and understanding basic Linux security vulnerabilities. By familiarizing yourself with common types of vulnerabilities and exploitation techniques, you'll increase the likelihood of successfully identifying and exploiting them when they occur.
The topic covers understanding basic Linux security vulnerabilities and gaining practical experience with various exploitation techniques.
Goals
- Familiarize with Linux security
- ELF section, workflow, protections
- Shellcode
- Heap overflow
- ASLR Bypass
- Arbitrary read and write
- Use Docker to create a vulnerable environment and apply techniques to exploit it
Resources
TBD
This project is part of:
Hack Week 24
Activity
Comments
Be the first to comment!
Similar Projects
Testing and adding GNU/Linux distributions on Uyuni by juliogonzalezgil
Join the Gitter channel! [https://gitter.im/uy...
Contributing to Linux Kernel security by pperego
Description
A couple of weeks ago, I foun...
toptop - a top clone written in Go by dshah
Description
toptop
is a clone of Linux's ...
Model checking the BPF verifier by shunghsiyu
Project Description
BPF verifier plays a ...
Kanidm: A safe and modern IDM system by firstyear
Kanidm is an IDM system written in Rust for mod...
Contributing to Linux Kernel security by pperego
Description
A couple of weeks ago, I foun...
OIDC Loginproxy by toe
Description
Reverse proxies can be a useful...
CVE portal for SUSE Rancher products by gmacedo
Description
Currently it's a bit difficul...