Linux Process Evasion: ptrace & prctl
Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.
Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.
Exploit the Time-of-Check to Time-of-Use (TOCTOU) window in udisks2. This analysis covers Polkit bypass, XFS image crafting, and Race Condition triggers for LPE.