Blog home Search
logologoGo to homepage
  • Technology
  • Features
  • Demos
  • Pricing
  • Resources
    • Helpdesk & FAQ
    • Documentation
    • Github
  • Company
    • About
    • Contact
  • Blog
Blog home Search
Subscribe to What's New Subscribe to What's New
Recent posts
  • Who corrupted the data! Get a fast and precise answer with the taint
  • REVEN OpenLab - Feb 18th, 2021
  • Detecting Buffer-Overflow vulnerabilities using REVEN
Categories
  • Reven (18)
  • Technical (18)
  • Tutorial (13)
  • Automation (2)
  • Conference (2)
  • All posts (50)
Tags
  • Axion (7)
  • Reven (43)
  • Reverse engineering (29)
  • Taint (9)
  • Use after free (1)
  • Flash (1)
  • Swf (1)
  • Reven axion (1)
  • Plugin (1)
  • Deobfuscation (3)
  • Ctf (1)
  • Ctf (2)
  • Bsod (1)
  • Kernel (2)
  • Race-condition (1)
  • Cve (9)
  • Adobe flash (1)
  • Demo (13)
  • Patchguard (1)
  • Exploit (3)
  • Windows kernel (3)
  • Scripts (1)
  • Windows boot (1)
  • Uefi (1)
  • Malware analysis (2)
  • Releases (6)
  • Announcement (6)
  • Automation (3)
  • Analysis api (7)
  • Workflow api (5)
  • Pe (1)
  • Parsing (1)
  • Pte (1)
  • Syscall (1)
  • Script (1)
  • Ossi (1)
  • Oob (1)
  • Read overflow (1)
  • Use after free (2)
  • Uaf (2)
  • Garbage collector (2)
  • Memory management (2)
  • Scenario recording (5)
  • Api (1)
  • Windbg (1)
  • Buffer overflow (2)
  • Performance (1)
  • Profiling (1)
  • Use case (1)
  • Vulnerability detection (2)
  • Use cases (1)
  • Cryptography (1)

1 post in archive

Reversing DirtyC0W

10 Sep 2017 by Fred - Technical - Reverse Engineering Kernel Race-condition REVEN

Everybody keeps in mind the Dirtyc0w Linux kernel bug. For those who don’t, take some time to refresh your memory here. The kernel race condition is triggered from user-space and can easily lead a random local user to write into any root owned file. In this article, we will demonstrate...

©2019 Tetrane