Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can look at the code to see to what great lengths it goes to exploit this.


I looked at the code within the original article, and while I could follow the general flow and function, that's about it.

Thus my question about the OP's (seemingly) confident statement and why they were comfortable making it.


It requires access to netlink socket. These are not remotely accessible.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: