3. Kernel Exploits
Last updated
Last updated
The kernel has complete control over the operating system. Exploiting a kernel vulnerability can result in execution as the root user.
Kernel exploits can leave the system in an unstable state, which is why you should only run them as a last resort.
Enumerate kernel version (uname -a
).
Find matching exploits (Google, ExploitDB, GitHub).
Use searchsploit to find matching exploits:
Alternatively, Run the tool to identify potential kernel exploits on the current system
Compile and run.