Home | VerSprite Resources
View VerSprite's Compliance Advisory Services →
Download Service Listings
Android Vulnerabilities and Exploits
This blog continues Part I of the android exploitation experiment. We build a proof-of-concept code with an Android NDK. UAF vulnerability (CVE-2019-2215)
Learn more
Batuhan Irmak
Exploitation of Vulnerabilities
This blog post will trigger a UAF vulnerability (CVE-2019-2215) in Binder from scratch. After preparing the necessary environment and tools, we will reach the KASAN output with the POC exploit.
linux operating system
This research series examined the Linux OS in detail and discussed everything from its architecture to the drivers and even the exploits. Today, we conclude the comprehensive research of Linux with an overview of its main elements.
To summarize again briefly, syscall is an instruction that lowers the privilege level of the currently running application to 0 and allows the program to be performed in higher privilege using the required registers. In this section, we look at the Syscall instruction at the assembly level and try to analyze it in detail.
mac os (operating system)
We already know that the entire Linux operating system is written in C. And not just the operating system, but many binaries that run on it are written in C. Although there are multiple reasons for this, the main reason is that C is a very fast and powerful language.
As we discussed in the previous parts, the Linux Kernel is a collection of code written entirely in C. This is important to keep in mind while we are dealing with the attack floats because the vulnerabilities found in the Linux Kernel can be found in any executable file written using the C programming language.
linux (operating system) os
In this section, we explore how these boundaries and privileges are shaped and even how they can change. We analyze User Mode and Kernel Mode, what the modes were developed for, and how the two are related.
android (operating system)
In the next series of articles, we conduct extensive research on Linux operating system. We do a deep dive into its architecture, strengths, vulnerabilities, and optimal ways to mitigate threats to the system
Back to Resources
We are an international squad of professionals working as one.
Email
Phone