Kernel Exploitation Via Uninitialized Stack

DEF CON 19

Presented by: Kees Cook
Date: Friday August 05, 2011
Time: 17:30 - 17:50
Location: Track 3
Track: Track 3

Leveraging uninitialized stack memory into a full-blown root escalation is easier than it sounds. See how to find these vulnerabilities, avoid the pitfalls of priming the stack, and turn your "memory corruption" into full root privileges.

Kees Cook

Kees Cook is part of the Ubuntu Security Team, where he tries to harden Ubuntu in particular, and Linux in general, against attack. In addition to being an Ubuntu developer, he's a member of the Ubuntu Technical Board, a Debian Developer, and a Kernel.org admin. As a long-time DEF CON Capture the Flag participant, he's especially proud of being part of Team 1@stPlace and winning in 2006 and 2007. Twitter: @kees_cook


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats