{"id":11734,"date":"2023-03-20T08:28:34","date_gmt":"2023-03-20T08:28:34","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/"},"modified":"2023-08-19T14:15:47","modified_gmt":"2023-08-19T14:15:47","slug":"attacking-the-linux-kernel-hitb2023hkt","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/","title":{"rendered":"Attacking the Linux Kernel"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<h4><strong><span style=\"color: #993300\">REGISTRATION CLOSED<\/span><\/strong><\/h4>\n<h4><strong>DATE: 21-24 August 2023<br \/>\n<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<\/div>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>21 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>22 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>23 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>24 Aug<\/td>\n<td>Thursday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h5><span style=\"font-weight: 400\">This training guides researchers through the field of Linux kernel security. In a series of exercise-driven labs, the training explores the process of finding, assessing, and exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture.<\/span><\/h5>\n<p><span style=\"font-weight: 400\">Besides providing a foundation for writing Linux kernel exploits, the training covers the no-less important areas of finding kernel bugs and evaluating their security impact. This includes chapters on using and extending dynamic bug-finding tools, writing custom fuzzers, and analyzing crashes.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The training starts with the beginner topics but proceeds into a few advanced areas as well.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Students will be Provided With<\/strong><\/h5>\n<p>A USB drive with:<\/p>\n<ul>\n<li>Presentation slides.<\/li>\n<li>Detailed lab guides with step-by-step instructions.<\/li>\n<li>Virtual machine images with tools, exercise binaries, and source code.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Course agenda<\/strong><\/h5>\n<h5>Day 1 \u2014 Internals and Sanitizers:<\/h5>\n<ul>\n<li>Internals and debugging: x86-64 architecture refresher; introduction to the Linux kernel; attack surface; types of vulnerabilities; setting up a kernel debugging environment; using GDB to debug the kernel and its modules.<\/li>\n<li>Detecting bugs: using KASAN to detect and analyze memory corruptions; KASAN internals; extending KASAN; KMSAN and other Sanitizers; reading kernel bug reports; assessing impact of kernel bugs.<\/li>\n<\/ul>\n<h5><\/h5>\n<h5>Day 2 \u2014 Fuzzing:<\/h5>\n<ul>\n<li>General fuzzing: writing and evaluating kernel-specific fuzzing harnesses; Human-in-the-Loop fuzzing; collecting coverage with KCOV; using KCOV remote coverage; fuzzing externally-triggerable code paths.<\/li>\n<li>Fuzzing with syzkaller: API-aware fuzzing; coverage-guided fuzzing; using syzkaller; writing syscall descriptions.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5>Day 3 \u2014 Escalating privileges and bypassing mitigations:<\/h5>\n<ul>\n<li>Escalating privileges: ret2usr; overwriting the cred structure; overwriting modprobe_path; kernel stack buffer overflows; arbitrary address execution and arbitrary read\/write primitives.<\/li>\n<li>Bypassing mitigations: KASLR, SMEP, SMAP, and KPTI bypass techniques; in-kernel Return-Oriented Programming (ROP); out-of-bounds vulnerabilities; information leaks.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5>Day 4 \u2014 Exploiting slab corruptions:<\/h5>\n<ul>\n<li>Exploiting basic slab corruptions: slab out-of-bounds and use-after-free vulnerabilities; slab-specific mitigations; slab spraying; data-only exploitation; the unlinking attack.<\/li>\n<li>Modern slab exploitation techniques: userfaultfd and FUSE; elastic objects; cross-cache corruptions.<br \/>\nBeyond: learning advanced exploitation techniques; useful references.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>REGISTRATION CLOSED DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours This training guides researchers through the field of Linux kernel security. In [&hellip;]<\/p>\n","protected":false},"featured_media":11733,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[77,62],"product_tag":[],"class_list":{"0":"post-11734","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-hitb2023hkt","7":"product_cat-virtual","9":"first","10":"instock","11":"featured","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attacking the Linux Kernel - HITBSecConf2023 - Phuket<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attacking the Linux Kernel - HITBSecConf2023 - Phuket\" \/>\n<meta property=\"og:description\" content=\"REGISTRATION CLOSED DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours This training guides researchers through the field of Linux kernel security. In [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Phuket\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-19T14:15:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/\",\"name\":\"Attacking the Linux Kernel - HITBSecConf2023 - Phuket\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png\",\"datePublished\":\"2023-03-20T08:28:34+00:00\",\"dateModified\":\"2023-08-19T14:15:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Attacking the Linux Kernel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\",\"name\":\"HITBSecConf2023 - Phuket\",\"description\":\"August 22 - 26 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attacking the Linux Kernel - HITBSecConf2023 - Phuket","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/","og_locale":"en_US","og_type":"article","og_title":"Attacking the Linux Kernel - HITBSecConf2023 - Phuket","og_description":"REGISTRATION CLOSED DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours This training guides researchers through the field of Linux kernel security. In [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/","og_site_name":"HITBSecConf2023 - Phuket","article_modified_time":"2023-08-19T14:15:47+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/","name":"Attacking the Linux Kernel - HITBSecConf2023 - Phuket","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png","datePublished":"2023-03-20T08:28:34+00:00","dateModified":"2023-08-19T14:15:47+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/Andrey-Konovalov-product-photo.png","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/attacking-the-linux-kernel-hitb2023hkt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/shop\/"},{"@type":"ListItem","position":3,"name":"Attacking the Linux Kernel"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/","name":"HITBSecConf2023 - Phuket","description":"August 22 - 26 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product\/11734"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/comments?post=11734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media\/11733"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media?parent=11734"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product_cat?post=11734"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product_tag?post=11734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}