• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: artex

Digging to the bottom. Escalating privileges to root with kernel exploitation techniques on a Hack The Box virtual machine
Coding

Digging to the bottom. Escalating privileges to root with kernel…

31.12.202117/04/2025artex180
This article discusses one of the most sophisticated PWN topics: kernel exploitation in Linux. You are about to learn what tools are required for kernel debugging, what are LKM, KGDB, IOCTL, and TTY, and many other exciting things!
CONTINUE READING 🡒
The big heap adventure. Mastering heap exploitation techniques on a Hack The Box virtual machine
Coding

The big heap adventure. Mastering heap exploitation techniques on a…

30.12.202108/04/2025artex120
This article covers the following topics: memory management algorithms in Linux, heap exploitation techniques, and exploitation of the Use-After-Free (UAF) vulnerability on a host where all protection mechanisms are enabled. The target machine is RopeTwo, one of the most hardcore VMs on Hack The Box.
CONTINUE READING 🡒
Secrets of V8 Engine. Dissecting Chrome on a Hack The Box virtual machine
Coding

Secrets of V8 Engine. Dissecting Chrome on a Hack The…

30.12.202117/04/2025artex80
No, this article isn’t about motor cylinders and valves – it’s about Google V8 Engine used in Chromium and Android. Today, I will show how to hack it on RopeTwo, the most hardcore VM on Hack The Box. Concurrently, you will learn what types of data…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com