Abstract: This paper demonstrates vulnerabilities within the SELinux framework as well as shortcomings in the type enforcement setup. I will show how to deconstruct a SELinux setup with some simple 80's style exploit techniques.
more here...........https://github.com/stealth/troubleshooter
more here...........https://github.com/stealth/troubleshooter