OP 16 April, 2024 - 08:43 PM
How could an attacker remotely take over a personal Linux or Android device? Send a malicious link and execute the code through the browser? Or target a messenger or email client? Well, how about sending a series of network packets and owning the kernel directly?
This article covers the experience with fuzzing the Linux kernel externally over the network. It will explain how to extend a kernel fuzzer called syzkaller for this purpose and show the errors found. The article also includes an introduction to syzkaller and its advanced feature: pseudo-syscalls.
This article covers the experience with fuzzing the Linux kernel externally over the network. It will explain how to extend a kernel fuzzer called syzkaller for this purpose and show the errors found. The article also includes an introduction to syzkaller and its advanced feature: pseudo-syscalls.