Linux kernel exploitation, a wonderful mess
Master Thesis
Author
Takaronis, Michail
Τακαρώνης, Μιχαήλ
Date
2024Advisor
Xenakis, ChristosΞενάκης, Χρήστος
View/ Open
Keywords
Linux ; Kernel ; Exploitation ; Binary exploitation ; Stack buffer overflow ; Use after free ; KernelandAbstract
This thesis explores the ins and outs of hacking into the Linux operating system’s
core, known as the kernel. We start by understanding how the Linux kernel is built,
looking at its different parts like the scheduler, memory management, and file system.
Next, we dive into making the kernel more secure and setting up a safe virtual
environment. We examine different security measures and tools that can protect the
kernel. We also learn how to create a virtual space to test things out without causing
harm. Then, we look at specific ways to break into the kernel. First, we examine a
problem called a ”stack buffer overflow,” going through the steps of how to exploit it.
After that, we check out another issue called ”Use After Free” and see how it can be
exploited. Finally, we explore some advanced topics, like finding and exploiting
mistakes in the kernel called ”null-dereferences” and ”double-fetch bugs.” These are
more complicated, but we break them down to understand how they work.