Linux Kernel Hacking: A to Z
This lecture analyzes various protection techniques in the Linux kernel, methods to bypass them, and various vulnerabilities. Practical examples are provided for each lecture.
644 learners
Level Intermediate
Course period Unlimited
News
9 articles
All lectures have been uploaded.
Sections 6-1 and 6-2 lectures have been uploaded.
Section 5-5 Double Fetch lecture has been uploaded.
Section 5-4 Arbitrary Write lecture has been uploaded.
Section 5-3 Kernel Heap Overflow lecture has been uploaded.
Due to health issues, I am currently experiencing some delays in recording Inflearn lectures. I apologize.
We plan to resume recording within 10 days at the latest, and we will update the lecture schedule soon. We will reward you with higher quality than before.
Also, if you have any questions or concerns regarding the lecture, please leave a question and we will respond as soon as possible.
thank you
Section 5-2 Kernel UAF lecture has been uploaded.
Section 5-1 Stack based BOF lecture has been uploaded.

