Video walkthrough the dirtyc0w privilege escalation exploit. Exploiting a Kernel race-condition.
site: http://dirtycow.ninja/
Patch: https://git.kernel.org/cgit/linux/ker...
Page Table Entry: https://www.kernel.org/doc/gorman/htm...
Madvise code: https://github.com/torvalds/linux/blo...
GUP code: https://github.com/torvalds/linux/blo...
=[ 🔴 Stuff I use ]=
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: https://liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CVE #SecurityResearch
Watch video Explaining Dirty COW local root exploit - CVE-2016-5195 online without registration, duration hours minute second in high quality. This video was added by user LiveOverflow 21 October 2016, don't forget to share it with your friends and acquaintances, it has been viewed on our site 240,710 once and liked it 4.3 thousand people.