마지막에 파일 구조체, vtable 뜯어보는 수업에서 시간을 많이 썼습니다. 이전에 라이브러리 함수를 그냥 쓰기만 했지 소스코드를 직접 분석해본적이 없었어서 그랬던것 같습니다 상당히 어려웠습니다
Why It's Worth Your Time
Modern Linux systems are protected by various security mechanisms, yet real-world attackers continue to find ways to bypass them and design exploits. This Path offers an in-depth analysis of key Linux system hacking techniques based on real vulnerabilities, focusing on how to bypass security mechanisms through hands-on exercises. Covering advanced topics like master canary, SECCOMP, SROP, _IO_FILE structure manipulation, and environment variable exploitation, this Path systematically builds practical attack skills rather than relying on theory alone. It is the ideal learning track for anyone aiming to develop professional-level Linux system hacking expertise. This Path is explained based on the x86-64 architecture of the Ubuntu 22.04/18.04 Linux operating system.
Topics Covered
- Understanding SECCOMP and bypass techniques
- Stack master canary, TLS understanding, and RIP control
- Manipulating Glibc's structures like
_rtld_globaland_IO_FILE - Leaking memory addresses via
__environ - Controlling registers using Sigreturn-Oriented Programming (SROP)
- Building real-world exploits and gaining shell access
Recommended For
- Those who want to practice advanced Linux exploitation techniques
- Those aiming to improve vulnerability analysis and exploit design skills
- Anyone interested in memory manipulation and bypassing system defenses
Prerequisite Knowledge
- Understanding of Linux system calls and OS internals
- Knowledge of C/C++ programming and memory structures
- Experience with assembly language and debugging tools
- Familiarity with basic system hacking techniques
- 1
- 2
- 3250 Coin250 CoinLearn how to exploit a vulnerability in _rtld_global to hijack the execution flow, targeting glibc prior to 2.34._rtld_globalBackground: _rtld_globalQuiz: _rtld_global[Exercise] overwrite _rtld_globalExploit Tech: overwrite _rtld_globalOverwrite _rtld_global[Self-practice] rtldrtld
- 4
- 5Sigreturn-Oriented Programming (SROP)Background: SigReturn-Oriented ProgrammingQuiz: SigReturn-Oriented Programming[Exercise] SigReturn-Oriented ProgrammingExploit Tech: SigReturn-Oriented ProgrammingSigReturn-Oriented Programming[Self-practice] send_sigsend_sig
- 6_IO_FILEBackground: _IO_FILEQuiz: _IO_FILE[Exercise] _IO_FILE Arbitrary Address WriteExploit Tech: _IO_FILE Arbitrary Address Write_IO_FILE Arbitrary Address Write[Exercise] _IO_FILE Arbitrary Address ReadExploit Tech: _IO_FILE Arbitrary Address Read_IO_FILE Arbitrary Address Read[Exercise] Bypass IO_validate_vtableExploit Tech: Bypass IO_validate_vtableBypass IO_validate_vtable[Self-practice] iofile_awiofile_aw

