Eudyptula Task3

This is Task 03 of the Eudyptula Challenge ------------------------------------------ Now that you have your custom kernel up and running, it's time to modify it! The tasks for this round is: - take the kernel git tree from Task 02 and modify the Makefile to and modify the EXTRAVERSION field. Do this in a way that the running kernel (after modifying the Makefile, rebuilding, and rebooting) has the characters "-eudyptula" in the version string....

June 16, 2022 · 11 min · 2292 words · ayedaemon

Eudyptula Task2

This is Task 02 of the Eudyptula Challenge ------------------------------------------ Now that you have written your first kernel module, it's time to take off the training wheels and move on to building a custom kernel. No more distro kernels for you, for this task you must run your own kernel. And use git! Exciting isn't it! No, oh, ok... The tasks for this round is: - download Linus's latest git tree from git....

June 1, 2022 · 11 min · 2287 words · ayedaemon

Hands-on Intro to SBOM

The concept of a Bill Of Materials (BOM) is well-established in traditional manufacturing as part of supply chain management. A manufacturer uses a BOM to track the parts it uses to create a product. If defects are later found in a specific part, the BOM makes it easy to locate affected products. In software industry, this concept is fairly new and is used to keep track of all the ingredients of the software....

May 27, 2022 · 8 min · 1526 words · ayedaemon

Eudyptula Task1

What is this? The Eudyptula Challenge is a series of programming exercises for the Linux kernel, that start from a very basic “Hello world” kernel module, moving on up in complexity to getting patches accepted into the main Linux kernel source tree. Unfortunately, this project is not accepting any new applicants right now. So I decided to gather tasks details from other online sources and complete them locally. Task-1 This is Task 01 of the Eudyptula Challenge ------------------------------------------ Write a Linux kernel module, and stand-alone Makefile, that when loaded prints to the kernel debug log level, "Hello World!...

May 25, 2022 · 7 min · 1443 words · ayedaemon

File-less malwares: what and how

What are file-less malwares? How do they work on linux? According to Wikipedia, file-less malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. In other words, the malware/program is never written to harddisk but directly loaded in memory. To get a better understanding of how that happens in linux, we need to understand how a normal program loads itself into memory and executes itself....

February 26, 2022 · 14 min · 2876 words · ayedaemon