Skip to content

ASkyeye/DirtyCred

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

DirtyCred

DirtyCred is a kernel exploitation concept that swaps unprivileged kernel credentials with privileged ones to escalate privilege. Instead of overwriting any critical data fields on kernel heap, DirtyCred abuses the heap memory reuse mechanism to get privileged. Although the concept is simple, it is effective.

Exploitation effects

Data-only: no need to bypass KASLR or leak kernel heap

Universal: the exploits written with DirtyCred would work across different kernels and architectures.

Effective: bypass all the available exploit mitigation in upstream kernel.

Demo

CVE-2021-4154

CVE-2022-2588

some others to be coming...

Defense

See the code here.

Publication

Blackhat USA 2022

Online Resource

We provide two VMs for testing CVE-2021-4154. Each connection to the VM has 10 minitues timeout (i.e. the VM will be shutdown after being connected for 10 minitues). Each connection will get a fresh VM, everything stored before will be reset. When accessing the VM, please login the system with low user whose password is low. Please compile the exploit code (named exp.c) then launch the attack.

How to connect to VMs

Please login with user low and password low

Ubuntu 20

nc 150.136.171.117 1337

or

socat FILE:`tty`,raw,echo=0 TCP:150.136.171.117:1337

Centos 8

nc 150.136.171.117 1338

or

socat FILE:`tty`,raw,echo=0 TCP:150.136.171.117:1338

Acknowledgment

This research was done with the help of Yuhang Wu and Xinyu Xing. Thanks Eduardo Vela for providing this amazing logo.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • LLVM 88.0%
  • C++ 11.7%
  • Other 0.3%