Continued with offensive capabilities, incorporated security features and started with tracing program features

This commit is contained in:
h3xduck
2022-06-02 19:00:10 -04:00
parent 5d5aafb46d
commit 2c3648a18a
16 changed files with 882 additions and 203 deletions

View File

@@ -31,7 +31,14 @@
\BOOKMARK [2][-]{subsection.2.4.2}{Bpftool}{section.2.4}% 31
\BOOKMARK [2][-]{subsection.2.4.3}{Libbpf}{section.2.4}% 32
\BOOKMARK [0][-]{chapter.3}{Analysis\040of\040offensive\040capabilities}{}% 33
\BOOKMARK [0][-]{chapter.4}{Methods??}{}% 34
\BOOKMARK [0][-]{chapter.5}{Results}{}% 35
\BOOKMARK [0][-]{chapter.6}{Conclusion\040and\040future\040work}{}% 36
\BOOKMARK [0][-]{chapter.6}{Bibliography}{}% 37
\BOOKMARK [1][-]{section.3.1}{Security\040features\040in\040eBPF}{chapter.3}% 34
\BOOKMARK [2][-]{subsection.3.1.1}{Access\040control}{section.3.1}% 35
\BOOKMARK [2][-]{subsection.3.1.2}{eBPF\040maps\040security}{section.3.1}% 36
\BOOKMARK [1][-]{section.3.2}{Abusing\040tracing\040programs}{chapter.3}% 37
\BOOKMARK [2][-]{subsection.3.2.1}{Access\040to\040function\040arguments}{section.3.2}% 38
\BOOKMARK [1][-]{section.3.3}{Memory\040corruption}{chapter.3}% 39
\BOOKMARK [2][-]{subsection.3.3.1}{Accessing\040user\040memory}{section.3.3}% 40
\BOOKMARK [0][-]{chapter.4}{Methods??}{}% 41
\BOOKMARK [0][-]{chapter.5}{Results}{}% 42
\BOOKMARK [0][-]{chapter.6}{Conclusion\040and\040future\040work}{}% 43
\BOOKMARK [0][-]{chapter.6}{Bibliography}{}% 44