SerenityOS - Writing a full chain exploit
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Javascript - T1059.007 Python - T1059.006 Trap - T1546.005 Trap - T1154 |
Common Information
Type | Value |
---|---|
UUID | ab79f619-d14f-414d-ad1f-d9cf365c48d0 |
Fingerprint | f7121133b8eb648f |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Feb. 11, 2021, 9:52 a.m. |
Added to db | Jan. 18, 2023, 9:32 p.m. |
Last updated | Nov. 17, 2024, 9:54 a.m. |
Headline | devcraft.io |
Title | SerenityOS - Writing a full chain exploit |
Detected Hints/Tags/Attributes | 36/1/11 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | kernel.map |
|
Details | Domain | 1 | aw.rs |
|
Details | File | 3 | typedarray.cpp |
|
Details | File | 364 | console.log |
|
Details | File | 1 | hax.cpp |
|
Details | File | 1 | kern.bin |
|
Details | File | 44 | payload.bin |
|
Details | File | 1 | payload.asm |
|
Details | File | 1 | hax.html |
|
Details | File | 1 | lookupserver.ini |
|
Details | Url | 1 | http://aw.rs/hax.html |