To avoid the pointer leak for the kernel RSP you could have used "syscall" to enter with a user stack. Good work, though :). This should work nicely as well!
-
-
-
After you told me you could get unsigned code executed with INT3, I took it as a challenge so I wouldn't take the easy way out :)
Kraj razgovora
Novi razgovor -
-
-
very nice post! as for the “bad” code gen, did you try to let the compiler know that the var is volatile?
-
Thanks :) As for the code gen, it shouldn't place the _readgsbase_u64() after __triggervuln either way should it?
Kraj razgovora
Novi razgovor -
-
-
Very good blog post.
-
Thanks :)
Kraj razgovora
Novi razgovor -
-
-
Wow, that was quick! Nice write up. :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Hocam türkmüsünüz ?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.