You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To find gadgets, we must first decompress the bzImage file. bzImage is a compressed version of the kernel image, so in order to find gadgets we need to decompress it using this script. It is included in the image directory, so to decompress the bzImage just do ./extract-vmlinux.sh bzImage > vmlinux.
The decompress script links to the same repo.
Is it a mistake?
I'm new to kernel exploit.
On this part of the article.
To find gadgets, we must first decompress the bzImage file. bzImage is a compressed version of the kernel image, so in order to find gadgets we need to decompress it using this script. It is included in the image directory, so to decompress the bzImage just do ./extract-vmlinux.sh bzImage > vmlinux.
The decompress script links to the same repo.
Is it a mistake?
https://github.com/pr0cf5/kernel-exploit-practice/blob/master/bypass-smep
Where is the decompress script?
The text was updated successfully, but these errors were encountered: