The kernel has complete control over the operating system. Exploiting a kernel vulnerability can result in execution as the root user.
Kernel exploits can leave the system in an unstable state, which is why you should only run them as a last resort.
Enumerate kernel version (uname -a).
uname -a
Find matching exploits (Google, ExploitDB, GitHub).
Use searchsploit to find matching exploits:
# searchsploit linux kernel 2.6.32 priv esc
Alternatively, Run the Linux Exploit Suggester 2arrow-up-right tool to identify potential kernel exploits on the current system
Compile and run.
Last updated 2 years ago