People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
ngx_resolver_copy() function is used to validate and decompress each DNS domain in a DNS response. This is done in two steps:
NULL, then the dot is written past the end of the heap buffer. 0x2E will clear the PREV_INUSE bit and set the IS_MMAPPED flag on the heap chunk. Because of the IS_MMAPPED, I would be surprised if this was possible to exploit by itself. s3_5_c15_c10_1 is directly accessible from EL0. This register contains two bits that can be read or written to (0 and 1). This is a per cluster register that can be accessed by all cores in a cluster. This creates a two bits convert challenge that can be used to send data across processes. HTTP.sys. Finding a vulnerability in a web server allows millions of sites to be compromised in one go. Accept-Encoding headers dictates which content-coding can be sent back to the client such as gzip, * or deflate. This can be in the form of a list as well. An example with a list looks like Accept-Encoding: deflate, gzip;q=1.0, *;q=0.5. ,) a path can be taken that will migrate some but not all of the nodes. content-type to be a form-urlencoded encoded in order to bypass this protection.