Tagged articles
1 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 21, 2026 · Information Security

Bypassing Linux Pkeys Security Mechanism in a PWN Challenge

An in‑depth analysis of Linux Memory Protection Keys (pkeys), their x86_64 and arm64 implementations, related syscalls, and a step‑by‑step exploit that randomises PKRU permissions and then uses WRPKRU to bypass the restrictions and capture the flag in a CTF PWN challenge.

CTFExploitLinux
0 likes · 12 min read
Bypassing Linux Pkeys Security Mechanism in a PWN Challenge