The new privilege escalation against the Linux is absolutely wild. In this video we talk about what a privesc is, how they typically work, and why the techniques used in this one are so wild Writeup: https://pwning.tech/nftables/ PoC: https://github.com/Notselwyn/CVE-2024-1086 Author: https://twitter.com/notselwyn/ 🏫 COURSES 🏫 Learn to code in C at https://lowlevel.academy πŸ“° NEWSLETTER πŸ“° Sign up for our newsletter at https://mailchi.mp/lowlevel/the-low-down πŸ›’ GREAT BOOKS FOR THE LOWEST LEVELπŸ›’ Blue Fox: Arm Assembly Internals and Reverse Engineering: https://amzn.to/4394t87 Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation : https://amzn.to/3C1z4sk Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software : https://amzn.to/3C1daFy The Ghidra Book: The Definitive Guide: https://amzn.to/3WC2Vkg πŸ”₯πŸ”₯πŸ”₯ SOCIALS πŸ”₯πŸ”₯πŸ”₯ Low Level Merch!: https://lowlevel.store/ Follow me on Twitter: https://twitter.com/LowLevelTweets Follow me on Twitch: https://twitch.tv/lowlevellearning Join me on Discord!: https://discord.gg/gZhRXDdBYY