3. Kernel Exploits
Introduction
The kernel has complete control over the operating system. Exploiting a kernel vulnerability can result in execution as the root user.
Kernel exploits can leave the system in an unstable state, which is why you should only run them as a last resort.
Finding Kernel Exploits
Enumerate kernel version (
uname -a
).Find matching exploits (Google, ExploitDB, GitHub).
Use searchsploit to find matching exploits:
Alternatively, Run the Linux Exploit Suggester 2 tool to identify potential kernel exploits on the current system
Compile and run.
Last updated