A couple of interesting blog posts on hiding Linux processes
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
#Linux
#Cybersecurity
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
#Linux
#Cybersecurity
dfir.ch
The 'Invisibility Cloak' - Slash-Proc Magic | dfir.ch
Technical blog by Stephan Berger (@malmoeb)
Intro to glibc heap exploitation (HitconCTF, glibc 2.31)
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Quarkslab
Heap exploitation, glibc internals and nifty tricks. - Quarkslab's blog
This is a writeup of a heap pwn challenge at HitconCTF Qualifiers 2024, which explains some glibc malloc internals and some heap exploitation tricks that can be used for getting a shell!
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
π3
This media is not supported in your browser
VIEW IN TELEGRAM
π€©5β€βπ₯3π3