You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _posts/general/2025-07-11-breaking-disassembly-through-symbol-resolution.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ Let's take a look at what actually happens when an ELF program tries to call `pu
87
87

88
88
_call puts@PLT which dereferences and jumps into GOT entry_
89
89
90
-
As you can see, when we call `puts`, it actually calls `puts@PLT` which attempts to dereference and jump into its own GOT entry. If the symbol has already been resolved before, the GOT entry of `puts` would contain the actually its function libc address.
90
+
As you can see, when we call `puts`, it actually calls `puts@PLT` which attempts to dereference and jump into its own GOT entry. If the symbol has already been resolved before, the GOT entry of `puts` would contain its libc address.
91
91
92
92

93
93
_puts@GOT after puts has been resolved_
@@ -430,7 +430,7 @@ Ultimately, this would make every single API function appear incorrectly and mig
430
430
- Decompiler might refuse to decompile due to incorrect call types _(if the fake function requires many more arguments that the original function)_
431
431
- Disassembler might stop disassembly early if it encounters a `noreturn` function _(i.e. exit, _exit, abort)_.
432
432
433
-
You can find the obfuscation scripts and test files [here](https://github.com/caprinux/rel-fuscate/obfusactor).
433
+
You can find the obfuscation scripts and test files [here](https://github.com/caprinux/rel-fuscate/tree/main/obfuscator).
434
434
435
435
## Deobfuscation is easier o_o
436
436
@@ -456,4 +456,4 @@ Exploring new ways to breaking disassembly/decompilation and deter reverse engin
456
456
457
457
I hope you enjoyed this post! If it interests you, you can check out some of the other CTF challenges that I've written in the past [here](https://github.com/caprinux/challenge-creation)_(including some other cursed obfuscated challenges)_.
458
458
459
-
Thanks to [goatmilkkk](https://goat.elmo.sg) for proofreading!
459
+
Thanks to [goatmilkkk](https://goat.elmo.sg) for proofreading!
title: Querying the Kernel for Exploitable Heap Structures
3
+
description: Using CodeQL to query the Kernel codebase
4
+
date: 2025-02-15 00:00:00 +0800
5
+
categories: [Resources]
6
+
tags: [kernel]
7
+
---
8
+
9
+
# Foreword
10
+
11
+
One of the biggest difficulties that I've faced as a beginner trying to get into Kernel Exploitation would be not knowing what exploitable heap structure I can use for any given heap-based vulnerability.
12
+
13
+
In fact, this is most certainly not a novel research topic. [ptr Yudai](https://x.com/ptryudai), who is highly respected in the exploit community, has also tackled this problem successfully using the Ghidra scripting engine.
0 commit comments