User contributions
		
		
		
		
		
		Jump to navigation
		Jump to search
		
		
	
- 21:45, 12 August 2016 diff hist +1 m Kernel Self Protection Project  →arm
 - 21:44, 12 August 2016 diff hist +101 m Kernel Self Protection Project  →arm
 - 21:42, 12 August 2016 diff hist +4,212 Kernel Self Protection Project 
 - 21:38, 31 July 2016 diff hist +17 Exploit Methods/Userspace data usage  →Mitigations
 - 17:34, 6 July 2016 diff hist −5 Kernel Self Protection Project  →Specific TODO Items
 - 16:29, 17 June 2016 diff hist +76 Kernel Self Protection Project  →Specific TODO Items
 - 21:25, 1 June 2016 diff hist +83 Kernel Self Protection Project  →Specific TODO Items
 - 20:23, 23 May 2016 diff hist +835 Kernel Self Protection Project 
 - 22:42, 5 May 2016 diff hist +8 m Feature List 
 - 22:41, 5 May 2016 diff hist +137 Feature List 
 - 22:21, 4 May 2016 diff hist +37 Feature List 
 - 22:10, 4 May 2016 diff hist +43 Exploit Methods/Reused code chunks  →Mitigations current
 - 22:10, 4 May 2016 diff hist +64 Exploit Methods/Reused code chunks  →Examples
 - 21:45, 4 May 2016 diff hist +135 Kernel Self Protection Project  →Work Areas: add link to feature list
 - 21:43, 4 May 2016 diff hist +1,502 N Feature List  initial dump of interesting features
 - 22:34, 12 April 2016 diff hist +52 Exploit Methods/Reused code chunks  →Examples
 - 22:29, 12 April 2016 diff hist +70 Bug Classes/Format string injection  →Examples current
 - 18:10, 5 April 2016 diff hist +1 Exploit Methods/Userspace execution  →Mitigations
 - 18:10, 5 April 2016 diff hist +27 Exploit Methods/Userspace data usage  →Mitigations
 - 18:09, 5 April 2016 diff hist +26 Exploit Methods/Userspace execution  →Mitigations
 - 23:55, 4 April 2016 diff hist +33 Exploit Methods/Userspace execution  →Details
 - 23:54, 4 April 2016 diff hist +601 Exploit Methods/Userspace execution  →Mitigations: add PXN table
 - 21:47, 9 March 2016 diff hist +123 Bug Classes/Integer overflow  →Examples current
 - 21:02, 3 February 2016 diff hist +69 Bug Classes/Integer overflow  →Examples: paste-o
 - 20:24, 21 January 2016 diff hist +970 N Bug Classes/Use after free  Created page with "= Details = When a memory allocation gets freed but there are still accidentally users of that memory, it is possible that an attacker could control the new memory allocation ..."
 - 20:18, 21 January 2016 diff hist +48 Kernel Self Protection Project  →Bug Classes
 - 20:18, 21 January 2016 diff hist +83 Bug Classes/Integer overflow  →Examples
 - 20:06, 4 January 2016 diff hist +59 Bug Classes/Integer overflow  →Examples
 - 16:37, 13 December 2015 diff hist 0 Exploit Methods/Userspace data usage  →Mitigations
 - 19:37, 10 December 2015 diff hist +43 Exploit Methods/Userspace data usage  →Mitigations
 - 19:21, 10 December 2015 diff hist +24 Exploit Methods/Userspace data usage  →Mitigations
 - 19:20, 10 December 2015 diff hist +2 m Exploit Methods/Userspace data usage  →Details
 - 19:20, 10 December 2015 diff hist +202 Exploit Methods/Userspace data usage  →Details
 - 19:18, 10 December 2015 diff hist +7 Exploit Methods/Userspace data usage  →Mitigations
 - 19:15, 10 December 2015 diff hist +59 Exploit Methods/Userspace data usage  →Mitigations
 - 18:45, 10 December 2015 diff hist +26 Exploit Methods/Userspace data usage  →Mitigations
 - 18:45, 10 December 2015 diff hist +2 Exploit Methods/Userspace data usage  →Mitigations
 - 18:38, 10 December 2015 diff hist +640 Exploit Methods/Userspace data usage 
 - 18:22, 10 December 2015 diff hist +140 Exploit Methods/Userspace execution 
 - 22:02, 18 November 2015 diff hist +47 Exploit Methods/Text overwrite  →Examples current
 - 21:49, 17 November 2015 diff hist +544 Kernel Self Protection Project  principles
 - 21:40, 17 November 2015 diff hist +129 Exploit Methods/Userspace data usage  →Examples
 - 01:50, 5 November 2015 diff hist +147 Bug Classes/Kernel pointer leak  →Details current
 - 23:25, 4 November 2015 diff hist +557 N Exploit Methods/Reused code chunks  Created page with "= Details = This is more generally knows as Return Oriented Programming (ROP) or Jump Oriented Programming (JOP), but ultimately boils down to using the kernel's own executabl..."
 - 23:20, 4 November 2015 diff hist +689 N Exploit Methods/Userspace data usage  Created page with "= Details = Sometimes an attacker won't be able to control the instruction pointer directly, but they will be able to redirect the dereference a structure or other pointer. In..."
 - 23:15, 4 November 2015 diff hist +626 N Exploit Methods/Userspace execution  Created page with "= Details = Once an attacker has gain control over the instruction pointers, it must be aimed somewhere. The place where attackers have the most control over memory layout ten..."
 - 23:10, 4 November 2015 diff hist +702 N Exploit Methods/Function pointer overwrite  Created page with "= Details = When an attacker has a write primitive, they can start function pointers to redirect execution. Function pointers exist in a large number of places in the kernel r..."
 - 23:00, 4 November 2015 diff hist +376 N Exploit Methods/Text overwrite  Created page with "= Details = If an attacker has a write primitive and knows where the kernel is located in memory, they could overwrite functions to do whatever they wanted. Protecting against..."
 - 22:55, 4 November 2015 diff hist +2 Exploit Methods/Kernel location  →Details current
 - 22:54, 4 November 2015 diff hist −2 m Exploit Methods/Kernel location  →Mitigations