a13xp0p0v.github.io/2021/08/25/lkrg-bypass.html
Preview meta tags from the a13xp0p0v.github.io website.
Linked Hostnames
12- 7 links toa13xp0p0v.github.io
- 5 links togithub.com
- 5 links totwitter.com
- 4 links towww.openwall.com
- 3 links toelixir.bootlin.com
- 1 link toinfosec.exchange
- 1 link tonvd.nist.gov
- 1 link tot.me
Thumbnail
Search Engine Appearance
Improving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG
This is the follow-up to my research described in the article "Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel." My PoC exploit for CVE-2021-26708 had a very limited facility for privilege escalation, and I decided to continue my experiments with that vulnerability. This article describes how I improved the exploit, added a full-power ROP chain, and implemented a new method of bypassing the Linux Kernel Runtime Guard (LKRG).
Bing
Improving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG
This is the follow-up to my research described in the article "Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel." My PoC exploit for CVE-2021-26708 had a very limited facility for privilege escalation, and I decided to continue my experiments with that vulnerability. This article describes how I improved the exploit, added a full-power ROP chain, and implemented a new method of bypassing the Linux Kernel Runtime Guard (LKRG).
DuckDuckGo
Improving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG
This is the follow-up to my research described in the article "Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel." My PoC exploit for CVE-2021-26708 had a very limited facility for privilege escalation, and I decided to continue my experiments with that vulnerability. This article describes how I improved the exploit, added a full-power ROP chain, and implemented a new method of bypassing the Linux Kernel Runtime Guard (LKRG).
General Meta Tags
12- titleImproving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG | Alexander Popov
- msapplication-TileColor#da532c
- msapplication-config/img/favicons/browserconfig.xml
- theme-color#ffffff
- charsetutf-8
Open Graph Meta Tags
7- og:titleImproving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG
- og:localeen_US
- og:descriptionThis is the follow-up to my research described in the article "Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel." My PoC exploit for CVE-2021-26708 had a very limited facility for privilege escalation, and I decided to continue my experiments with that vulnerability. This article describes how I improved the exploit, added a full-power ROP chain, and implemented a new method of bypassing the Linux Kernel Runtime Guard (LKRG).
- og:urlhttps://a13xp0p0v.github.io/2021/08/25/lkrg-bypass.html
- og:site_nameAlexander Popov
Twitter Meta Tags
2- twitter:cardsummary
- twitter:site@a13xp0p0v
Link Tags
8- alternatehttps://a13xp0p0v.github.io/feed.xml
- apple-touch-icon/img/favicons/apple-touch-icon.png
- canonicalhttps://a13xp0p0v.github.io/2021/08/25/lkrg-bypass.html
- icon/img/favicons/favicon-32x32.png
- icon/img/favicons/favicon-16x16.png
Emails
1Links
31- https://a13xp0p0v.github.io
- https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
- https://a13xp0p0v.github.io/2021/08/25/lkrg-bypass.html
- https://a13xp0p0v.github.io/about
- https://a13xp0p0v.github.io/articles