For the Kernel Image and the exploit visit (https://github.com/nishantparhi/Custom-Kernel-Exploit)
I will present the first steps I learned in the operating system kernel exploitation- Linux, what can be done, how to do it, and especially the basics that will open the kernel login gateway.This article is not about researching/exploiting weaknesses in the operating system but rather exploiting weaknesses that occur when we run in Kernel mode. In the field of binary exploitation, or know and understand the following:
Kernel Mode can run 2 types of code:
My Journey with Google Code In started 3 years ago. In my first year as a participant, I completed 7 tasks for Ubuntu. I had started too late and was unable to do more than 7 tasks. I waited a year for Google Code In 2019 and I participated in Fedora-Project. In just 2–3 Days I completed 6 tasks which gave me a confidence boost to compete further in the competition. I started communicating with the mentors in fedora who were really helpful and supportive. When the Contest ended, I had completed 27 tasks, the highest number of task for…
I have already briefed about tensorflow in my old blogs, in short it is an open-source library with is capable of running machine learning algorithms. Now lets jump to the installation part.
*Installation of Tensorflow with GPU support and anaconda*
NVIDIA GPU card with CUDA® Compute Capability 3.5 or higher, CUDA-enabled GPU cards
The following NVIDIA software must be installed on your system: