#CVE #SecurityResearch

Explaining Dirty COW local root exploit - CVE-2016-5195





The interactive transcript could not be loaded.


Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Oct 21, 2016

Video walkthrough the dirtyc0w privilege escalation exploit. Exploiting a Kernel race-condition.

site: http://dirtycow.ninja/
Patch: https://git.kernel.org/cgit/linux/ker...
Page Table Entry: https://www.kernel.org/doc/gorman/htm...
Madvise code: https://github.com/torvalds/linux/blo...
GUP code: https://github.com/torvalds/linux/blo...

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://amzn.to/2LW6ldx
β†’ Graphics tablet:* https://amzn.to/2C8djYj
β†’ Camera#1 for streaming:* https://amzn.to/2SJ66VM
β†’ Lens for streaming:* https://amzn.to/2CdG31I
β†’ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj
β†’ Camera#2 for electronics:* https://amzn.to/2LWxehv
β†’ Lens for macro shots:* https://amzn.to/2C5tXrw
β†’ Keyboard:* https://amzn.to/2LZgCFD
β†’ Headphones:* https://amzn.to/2M2KhxW

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveover...
β†’ per Month: https://www.youtube.com/channel/UClcE...

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CVE #SecurityResearch


When autoplay is enabled, a suggested video will automatically play next.

Up next

to add this to Watch Later

Add to

Loading playlists...