You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello fi01:
Thanks for providing this POC code,it helps me a lot.As a beginner,I am researching a method to bypass PXN recently.However,something are confusing me.When we attempt to bypass PXN,we need use R0 or R1 to build a ROP chain.So,how to confirm R0 or R1? inet_release() func in kernel source,arg is sock.setup_getroot() func in POC code,arg is sk. If sk equals sock? This poc cann't running in an emulator,so i cann't debug kernel to prove these. Could you help me please?
The text was updated successfully, but these errors were encountered:
@GeneBlue every time I try to debug the goldfish kernel the code gets stuck into an infinite loop while trying to control sk. How did you bypass that? I tried after a while overwriting the socks table with new vulnerable sockets and then trying again but still same issue.
Hello fi01:
Thanks for providing this POC code,it helps me a lot.As a beginner,I am researching a method to bypass PXN recently.However,something are confusing me.When we attempt to bypass PXN,we need use R0 or R1 to build a ROP chain.So,how to confirm R0 or R1? inet_release() func in kernel source,arg is sock.setup_getroot() func in POC code,arg is sk. If sk equals sock? This poc cann't running in an emulator,so i cann't debug kernel to prove these. Could you help me please?
The text was updated successfully, but these errors were encountered: