Skip to content

rizkyalam/kernel-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

This is was a simple write up kernel exploitation using privilege escalation attack, I create this for learning system security from TryHackMe

Privilege Escalation Attack

Before we dive straight into the challenge, privilege escalation are a method that take advantage of vulnerabilities in the Linux kernel itself. Since the kernel operates at the highest privilege level, a successful exploit can allow a low-privileged user to gain root access.

Exploit

First, ensure that you start an SSH session to the lab. Once connected, you should identify kernel version using this command:

linux version command

Now, it's time to research and find the right, you can use like from Exploit Database or from exploit.asm file. Keep in mind that in a real penetration testing scenario, these exploits can potentially crash systems and cause service disruptions.

After that we can compile and run this exploit script to get the flag.

exploit command

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published