Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE
Hack In The Box Security Conference via YouTube
Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
Finance Certifications Goldman Sachs & Amazon Teams Trust
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the intricacies of exploiting a Linux kernel vulnerability in the netlink subsystem to achieve local privilege escalation on Ubuntu 22.04. Delve into the details of a limited use-after-free (UAF) bug that allows unprivileged users to escalate to root on systems permitting unprivileged namespace creation. Learn about the exploitation methods employed to develop a reliable privilege escalation exploit, including techniques to bypass KASLR and execute ROP gadgets in the kernel. Discover how multiple UAF triggers are leveraged to build powerful exploit primitives, from initial leak primitives to more advanced information leaks and function pointer manipulation. Gain insights from an industry veteran with over 20 years of experience in exploit development, covering various platforms including Xen, Windows kernel, Cisco devices, and Android.
Syllabus
#HITB2022SIN Exploiting A Limited UAF On Ubuntu 22.04 To Achieve LPE - Aaron Adams
Taught by
Hack In The Box Security Conference