Explaining Dirty COW local root exploit - CVE-2016-5195

Published: 21 October 2016
on channel: LiveOverflow
240,710
4.3k

Video walkthrough the dirtyc0w privilege escalation exploit. Exploiting a Kernel race-condition.

site: http://dirtycow.ninja/
Patch: https://git.kernel.org/cgit/linux/ker...
Page Table Entry: https://www.kernel.org/doc/gorman/htm...
Madvise code: https://github.com/torvalds/linux/blo...
GUP code: https://github.com/torvalds/linux/blo...

=[ 🔴 Stuff I use ]=

→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

=[ ❤️ Support ]=

→ per Video:   / liveoverflow  
→ per Month:    / @liveoverflow  

=[ 🐕 Social ]=

→ Twitter:   / liveoverflow  
→ Website: https://liveoverflow.com/
→ Subreddit:   / liveoverflow  
→ Facebook:   / liveoverflow  

=[ 📄 P.S. ]=

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CVE #SecurityResearch


Watch video Explaining Dirty COW local root exploit - CVE-2016-5195 online without registration, duration hours minute second in high quality. This video was added by user LiveOverflow 21 October 2016, don't forget to share it with your friends and acquaintances, it has been viewed on our site 240,710 once and liked it 4.3 thousand people.