Linux Kernel Attack Surface: beyond IOCTL. DMA-BUFLinux Kernel Attack Surface: beyond IOCTL. DMA-BUFDec 26, 2024Dec 26, 2024
Finding Bugs in Kernel. Part 2: Fuzzing the Actual KernelFuzzing the kernel: start the campaign, go to sleep, wake up to mysteries you may never solve. Here’s what happened when I took on …Nov 19, 2024Nov 19, 2024
Fuzzing the Kernel with syzkaller. Part 1: Setting up on Mac and Crashing a Vulnerable Driversyzkaller is one of the best fuzzers for the Linux kernel. It supports coverage (through KCOV) and provides a way to declaratively describe…Sep 17, 2024Sep 17, 2024
Hunting Bugs in Linux Kernel With KASAN: How to Use it & What’s the Benefit?It all started when I had brain surgery. After several days in the hospital, I got home. But I guess the surgeon hit something in my brain…Sep 10, 2024Sep 10, 2024
Choosing Cybersecurity Projects That Advance Your Skills — From Endless Struggles to Endless BugsFeeling inspired is a fantastic start; it fuels real-world accomplishments. However, passion alone doesn’t guarantee results…Jul 8, 20244Jul 8, 20244
Found Bugs, Got paid, Stayed poor: Making a Living with Bug BountiesEarly 2021. After feeling unsatisfied with my job for quite some time and battling burnout, I decided to take a sabbatical. “To hell with…Jun 22, 202413Jun 22, 202413
File Fuzzing: Easy and Really Fast with this AFL++ FeatureSrelay, a pretty old SOCKS4 sounded like a good opportunity to try out some of AFL++’s new features…Apr 22, 2024Apr 22, 2024
ARM TrustZone: A Crash Course for ReversersEssentials for reverse engineering Trusted Operating SystemsJan 7, 2024Jan 7, 2024