DirtyCred
Kernel exploitation technique (by Markakd)
phantom-attack
POC for Phantom Attack (by rexguowork)
DirtyCred | phantom-attack | |
---|---|---|
5 | 1 | |
558 | 76 | |
- | - | |
0.6 | 0.0 | |
6 months ago | over 1 year ago | |
LLVM | C | |
- | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DirtyCred
Posts with mentions or reviews of DirtyCred.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-16.
- DirtyCred: DirtyCred is a kernel exploitation concept that swaps unprivileged kernel credentials with privileged ones to escalate privilege. Instead of overwriting any critical data fields on kernel heap, DirtyCred abuses the heap memory reuse mechanism to get privileged.
- DirtyCred: Linux Kernel Privilege Escalation
- GitHub - Markakd/DirtyCred
- DirtyCred (vulnerability for Linux found at BlackHat conference) - what is the deal with this? Media is making headlines about it but nothing here?
-
Blackhat 2022 recap – Trends and highlights
The new exploitation method presented by Zhenpeng Lin is called DirtyCred and is based on swapping Linux Kernel credentials. It’s simple, effective and generic. This allows it to perform container escape and still be an actual threat.
phantom-attack
Posts with mentions or reviews of phantom-attack.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-16.
-
Blackhat 2022 recap – Trends and highlights
The demo is performed exploiting using Phantom-attack, presented at DefCon 29. The mitigation was using the new version of Falco (>0.32), and it is also recommended to use other methods to block the system call such as seccomp. This would affect its performance.
What are some alternatives?
When comparing DirtyCred and phantom-attack you can also consider the following projects:
rewrite - Automated mass refactoring of source code.
rbac-police - Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego
falco - Cloud Native Runtime Security