I solved my first ever v8 exploitation challenge this past weekend and did a little writeup on it:
blog.zolutal.io/securinets-s...
@zolutal.bsky.social
PhD Student at ASU | blog.zolutal.io Captain of Shellphish | shellphish.net she/her
I solved my first ever v8 exploitation challenge this past weekend and did a little writeup on it:
blog.zolutal.io/securinets-s...
a screenshot of debug output from doing a successful nested page walk
Success :3
03.10.2025 19:24 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0that my normal guest page-walking code for converting an L1 virtual address to an L1 physical address was able to be entirely reused to do an L2 physical address to L1 physical address walk by just using the L1 EPTP in place of the L1 cr3 was pretty neat
03.10.2025 19:24 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0it was actually surprisingly easy to implement, except that I for some reason was treating the result of the nested page walk as an L1 physical address instead of an L2 physical address, just needed one more page walk to finish it off
03.10.2025 19:24 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0a screenshot of debug output from doing a successful nested page walk
Success :3
03.10.2025 19:24 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0"Yes please walk the EPT in L1 for the L2 cr3 to get the L2 PML4 physical address in L1 so you can convert that to a virtual address in your VMM to read the L2 PML4E associated with an L2 virtual address" - Statements dreamed up by the utterly Deranged
03.10.2025 08:03 โ ๐ 2 ๐ 1 ๐ฌ 1 ๐ 0I finally got around to blogging again!
This time its about the fun rabbit hole I went down last year of trying to improve Linux kernel ROP gadget discovery:
blog.zolutal.io/joys-of-kern...
We brought the FineIBT bypass to the linux-hardening mailing list a few months ago and it has since been addressed by introducing a new paranoid FineIBT mode that adds caller-side checks.
The LWN article that got written about it does a good job describing the issue and fix: lwn.net/Articles/101...
My first paper is now up on the USENIX Security site :)
We evaluated the prevalence of x86_64/aarch64 system instructions in Linux kernel builds and their applicability to Control Flow Hijacking exploitation, identifying a FineIBT (Kernel CFI) bypass in the process!
www.usenix.org/conference/u...