SDF Chatter
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
udunadan@infosec.pubM to Exploit Development@infosec.pubEnglish · 2 years ago

Escaping the Google kCTF Container with a Data-Only Exploit

h0mbre.github.io

external-link
message-square
0
fedilink
  • cross-posted to:
  • netsec@lemmy.world
7
external-link

Escaping the Google kCTF Container with a Data-Only Exploit

h0mbre.github.io

udunadan@infosec.pubM to Exploit Development@infosec.pubEnglish · 2 years ago
message-square
0
fedilink
  • cross-posted to:
  • netsec@lemmy.world
Introduction I’ve been doing some Linux kernel exploit development/study and vulnerability research off and on since last Fall and a few months ago I had some downtime on vacation to sit and challenge myself to write my first data-only exploit for a real bug that was exploited in kCTF. io_ring has been a popular target in the program’s history up to this point, so I thought I’d find an easy-to-reason-about bug there that had already been exploited as fertile ground for exploit development creativity. The bug I chose to work with was one which resulted in a struct file UAF where it was possible to hold an open file descriptor to the freed object. There have been quite a few write-ups on file UAF exploits, so I decided as a challenge that my exploit had to be data-only. The parameters of the self-imposed challenge were completely arbitrary, but I just wanted to try writing an exploit that didn’t rely on hijacking control flow. I have written quite a few Linux kernel exploits of real kCTF bugs at this point, probably 5-6 as practice, just starting with the vulnerability and going from there, but all of them have ended up in me using ROP, so this was my first try at data-only. I also had not seen a data-only exploit for a struct file UAF yet, which was encouraging as it seemed it was worthwile “research”. Also, before we get too far, please do not message me to tell me that someone already did xyz years prior. I’m very new to this type of thing and was just doing this as a personal challenge, if some aspects of the exploit are unoriginal, that is by coincidence. I will do my best to cite all my inspiration as we go.
alert-triangle
You must log in or register to comment.

Exploit Development@infosec.pub

exploitdev@infosec.pub

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !exploitdev@infosec.pub

A curated community dedicated to strictly technical materials about vulnerability research, exploit development and reverse engineering.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 1 user / 6 months
  • 5 local subscribers
  • 458 subscribers
  • 84 Posts
  • 15 Comments
  • Modlog
  • mods:
  • udunadan@infosec.pub
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org