Главная
Study mode:
on
1
Intro
2
xt_qtaguld - Introduction
3
xt_qtagulud Open Device
4
CVE-2017-13273
5
eventfd leaks kernel heap address
6
Step 1 - Double Free on kmalloc-128
7
KASLR Leak
8
Rooting (possible primitives)
9
Step 3 - Rooting (controlling seq_operations)
10
Step 3 - Rooting (overwriting addr_limit?)
11
Step 3 - Rooting (the ultimate ROP)
12
Step 3 - Rooting (root shell)
13
Summarization for Exploiting CVE-2021-0399
14
CONFIG_SLAB_FREELIST HARDENED
15
KFENCE
16
Kernel Control Flow Integrity
17
CONFIG_DEBUG_LIST
18
On-Device Protection
19
Backend Infrastructure
20
Behavioural Detection
21
Summary
Description:
Explore the intricacies of exploiting a Use-After-Free vulnerability in the Android kernel's xt_qtaguid module in this 32-minute Black Hat conference talk. Delve into the history of vulnerabilities in the module, including the recently discovered CVE-2021-0399. Follow the Google Android Security team's investigation into the exploit potential, examining techniques like double free on kmalloc-128, KASLR leak, and various rooting methods. Learn about kernel protection mechanisms such as CONFIG_SLAB_FREELIST_HARDENED, KFENCE, and Kernel Control Flow Integrity. Gain insights into on-device protection, backend infrastructure, and behavioral detection methods used to mitigate such vulnerabilities in Android systems.

The Art of Exploiting UAF by Ret2bpf in Android Kernel

Black Hat
Add to list
0:00 / 0:00