Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The link of decompressing the bzImage is missing? #3

Open
NobinPegasus opened this issue Jul 29, 2023 · 0 comments
Open

The link of decompressing the bzImage is missing? #3

NobinPegasus opened this issue Jul 29, 2023 · 0 comments

Comments

@NobinPegasus
Copy link

I'm new to kernel exploit.

On this part of the article.

To find gadgets, we must first decompress the bzImage file. bzImage is a compressed version of the kernel image, so in order to find gadgets we need to decompress it using this script. It is included in the image directory, so to decompress the bzImage just do ./extract-vmlinux.sh bzImage > vmlinux.

The decompress script links to the same repo.
Is it a mistake?

https://github.com/pr0cf5/kernel-exploit-practice/blob/master/bypass-smep
Where is the decompress script?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant