Welcome to Forensic Methods, an archive of computer forensic resources to assist clients, students, and fellow practitioners
Linux Local Privilege Escalation via SUID /proc/pid/mem Write Mempodipper Introducing Mempodipper, an exploit for CVE-2012-0056. /proc/pid/mem is an interface for reading and writing, directly, process memory by seeking around with the same addresses as the process's virtual memory space. In 2.6.39, the protections against unauthorized access to /proc/pid/mem were deemed sufficient, and so the pri
ã¡ã¢ãªãã©ã¬ã³ã¸ãã¯ã¯ãæ®çºæ§ã®ãã¼ã¿ã解æããæè¡ã§ããã¤ã³ã·ãã³ãã¬ã¹ãã³ã¹ã«ããã¦ã¯ããã©ãã¨éä¿¡ãã¦ãããããã©ããªããã°ã©ã ãã¹ã¬ãããåãã¦ãããããã©ã®ãããªãã¼ã¿ãã¡ã¢ãªä¸ã«ãããã³ã°ããã¦ãããããªã©ã®æ å ±ããã°ãã°éè¦ã«ãªã£ã¦ãã¾ããã¡ã¢ãªãã©ã¬ã³ã¸ãã¯ããã¾ãæ´»ç¨ãããã¨ã§ããããã®æ å ±ãæ½åºãããã¨ãå¯è½ã«ãªãã¾ããä»åã¯ãã¡ã¢ãªãã©ã¬ã³ã¸ãã¯ã®ãã¯ããã¯ãç¨ãã¦ãã«ã¦ã§ã¢ã®ææçè·¡ã調ã¹ãæ¹æ³ãç´¹ä»ãã¾ãã æ°å¹´åã¾ã§ãæ®çºæ§ã®ãã¼ã¿ãåå¾ããæ¹æ³ã¯ã対象ã®ãã·ã³ä¸ã§ããã»ã¹æ å ±ãéä¿¡æ å ±ãªã©ãåºåããã³ãã³ã(ãã¨ãã°ãnetstat)ãå®è¡ããããæ¹ã主æµã§ãããããããã®ããæ¹ã§ã¯ã以ä¸ã®äºç¨®é¡ã®æ å ±ãåå¾ãããã¨ãã§ãã¾ããã API ã®ããã¯ããªã³ã¯ãªã¹ãã®æ¹ãããªã©ã«ãããæå³çã«é è½ããã¦ããæ å ±çµäºããããã»ã¹ãªã©ãæ¢ã«éæ¾ãããã¡ã¢ãªé åã«åå¨ã
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãç¥ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}