Explore the world
of Cybersecurity

  • Application security

    NIS2 Directive: A Step Forward in the EU’s Cybersecurity Strategy

    With the NIS2 directive, the European Union takes a step forward in defining its cybersecurity strategy, aiming to strengthen the security of networks and information systems across all member states.

  • Vulnerability research

    64 bytes and a ROP chain – A journey through nftables – Part 2

    In my previous blog post, we discussed the vulnerability research and validation process. Now, let's get to the exploitation of a stack overflow in the interrupt context by dividing it into two main parts: defeating KASLR and privilege escalation.

  • Vulnerability research

    64 bytes and a ROP chain – A journey through nftables – Part 1

    The purpose of this article is to dive into the process of vulnerability research in the Linux kernel through my experience that led to the finding of CVE-2023-0179 and a fully functional Local Privilege Escalation (LPE). By the end of this post, the reader should be more comfortable interacting with the nftables component and approaching the new mitigations encountered while exploiting the kernel stack from the network context.

Discover how we can help you

Together, we’ll find the best solutions to tackle the challenges your business faces every day.

    * required fields