Linux Kernel Exploitation
03 Aug 2018We’ll see today how we can elevate our privileges exploiting a kernel overflow vulnerability on Linux.
We’ll see today how we can elevate our privileges exploiting a kernel overflow vulnerability on Linux.
On this post we’ll see how to setup Frida for Android and how to develop basic instrumentation scripts.
On this post we’ll see how NoSQL databases can be injected. We’ll see how to bypass an authentication and how to exploit a blind NoSQL injection with python.