Peneter Tools – Telegram
This repository contains de materials for the talk "Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS.", which was presented at DEFCON30.

https://github.com/infobyte/cve-2022-27255
#Realtek #eCos
Security researchers discovered 3 vulnerabilities in the Linux kernel that could allow a local attacker to elevate privileges and potentially execute malicious code. The proof-of-concept code is publicly available increasing the likelihood of exploitation in the wild.

https://github.com/greek0x0/2022-LPE-UAF

https://zplin.me/papers/DirtyCred-Zhenpeng.pdf

#LPE
The sources of the Linux kernel exploitation technique called DirtyCred are now on GitHub. The attack, which was presented at Black Hat 2022 security conference, is a kernel exploitation concept that swaps unprivileged kernel credentials with privileged ones to escalate privileges without overwriting any critical data on the kernel heap.

https://github.com/Markakd/DirtyCred
#LPE