Continued with execve hijacking.

This commit is contained in:
h3xduck
2022-06-13 22:16:34 -04:00
parent a1a41b02df
commit 163f923c55
11 changed files with 21121 additions and 20348 deletions

View File

@@ -636,6 +636,38 @@ AMD64 Architecture Processor Supplement},
@online{syscall_reference,
title={Linux Syscall Reference (64bit)},
url={https://syscalls64.paolostivanin.com/}
},
@online{code_kernel_execve,
indextitle={Linux kernel code},
url={https://elixir.bootlin.com/linux/v5.11/source/fs/exec.c#L2054}
},
@online{environ,
title={How to Set and List Environment Variables in Linux},
date={2021-06-03},
url={https://linuxize.com/post/how-to-set-and-list-environment-variables-in-linux/}
},
@online{execve_man,
title={execve(2) — Linux manual page},
url={https://man7.org/linux/man-pages/man2/execve.2.html}
},
@online{bpf_probe_write_user_errors,
title={[iovisor-dev] Accessing user memory and minor page faults},
date = {2017-08-06},
url={https://lists.linuxfoundation.org/pipermail/iovisor-dev/2017-September/001035.html}
},
@online{c_standard_main,
title={Main function},
url={https://en.cppreference.com/w/c/language/main_function}
},
@online{busybox_argv,
title={BusyBox Examples},
url={https://en.wikipedia.org/wiki/BusyBox#Examples}
}