Forwarded from IOSSec
An awesome series of articles about linux rootkit internals (with capturing all fresh changes in kernel). This resource provides a great base for reverse engineers who want to understand architecture of this malware class.
links:
https://xcellerator.github.io/posts/linux_rootkits_01 (first)
https://xcellerator.github.io/posts/linux_rootkits_11/ (last)
#rootkits #reverse_engineering #kernel
links:
https://xcellerator.github.io/posts/linux_rootkits_01 (first)
https://xcellerator.github.io/posts/linux_rootkits_11/ (last)
#rootkits #reverse_engineering #kernel
Linux Rootkits Part 1: Introduction and Workflow
Linux Rootkits Part 1: Introduction and Workflow :: TheXcellerator
Learning about Linux rootkits is a great way to learn more about how the kernel works. What’s great about it is that, unless you really understand what the kernel is doing, your rootkit is unlikely to work, so it serves as a fantasic verifier.
In the FreeBSD…
In the FreeBSD…
Forwarded from IOSSec
Small collection of articles about hacking linux kernel for beginners. (Special thanks to Matt for providing sources!)
1) https://pwning.systems/posts/an-introduction-to-kernel-exploitation-part1/
2) https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-1/
3) https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
4) https://meowmeowxw.gitlab.io/ctf/3k-2021-klibrary/
5) https://ptr-yudai.hatenablog.com/entry/2020/03/16/165628#seq_operations
6) https://syst3mfailure.io/hotrod
7) https://www.vsecurity.com/download/papers/slob-exploitation.pdf
#kernel #pwn #internals
1) https://pwning.systems/posts/an-introduction-to-kernel-exploitation-part1/
2) https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-1/
3) https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
4) https://meowmeowxw.gitlab.io/ctf/3k-2021-klibrary/
5) https://ptr-yudai.hatenablog.com/entry/2020/03/16/165628#seq_operations
6) https://syst3mfailure.io/hotrod
7) https://www.vsecurity.com/download/papers/slob-exploitation.pdf
#kernel #pwn #internals
Ломаем Винду через блокнот
https://martyniak-it.company/2020/01/02/vyrus%d1%8b-v-bloknote-za-2-mynut%d1%8b/
https://martyniak-it.company/2020/01/02/vyrus%d1%8b-v-bloknote-za-2-mynut%d1%8b/
25 skills for pentesters
https://www.infosecmatter.com/top-25-penetration-testing-skills-and-competencies-detailed/
https://www.infosecmatter.com/top-25-penetration-testing-skills-and-competencies-detailed/
InfosecMatter
Top 25 Penetration Testing Skills and Competencies (Detailed) - InfosecMatter
List of 25 penetration testing skills every professional penetration tester or ethical hacker should have. Also applicable to red teamers and security auditors.
protecting linux servers
https://www.securedyou.com/how-to-secure-linux-server-from-hackers-hardening-guide/#What_is_Linux_Server_Hardening_and_Why_it_is_important
https://www.securedyou.com/how-to-secure-linux-server-from-hackers-hardening-guide/#What_is_Linux_Server_Hardening_and_Why_it_is_important
SecuredYou
8 Best Ways To Secure Linux Server (Linux Hardening Guide 2022) - SecuredYou
Learn How to Secure your Linux Server from Hackers. Follow this step-by-step Linux Hardening Guide with the best Linux security tips for maximum protection.