System Exploitation


CSE 466 - Fall 2024

Step into the realm of system exploitation, where moving from user land to the kernel echoes the fluidity and precision of a martial artist transitioning between stances. In userland, you'll apply foundational techniques, preparing for the strategic leap into the kernel, akin to a perfectly executed flying kick. You'll land in the kernel with an electrifying strike of technical mastery and strategic brilliance to deliver the final blow.


Lectures and Reading


Challenges

Take advantage of yan85.. in the kernel!

Take advantage of yan85.. in the kernel!

Defeat yan85's seccomp implementation.

Defeat yan85's seccomp implementation.

Introducing... multiple ypus!

Introducing... multiple ypus!

Exploit a userland binary with mutexes.

Exploit a userland binary with mutexes.

Exploit the userland binary to run multiple ypus.

Exploit the userland binary to run multiple ypus.

Exploit the userland binary to run multiple ypus.

Exploit the userland binary to run multiple ypus.

Circumvent yan85's output sanitization.

Circumvent yan85's output sanitization.

Circumvent yan85's output sanitization with KASLR.

Circumvent yan85's output sanitization with KASLR.


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score