This is was a simple write up kernel exploitation using privilege escalation attack, I create this for learning system security from TryHackMe
Before we dive straight into the challenge, privilege escalation are a method that take advantage of vulnerabilities in the Linux kernel itself. Since the kernel operates at the highest privilege level, a successful exploit can allow a low-privileged user to gain root access.
First, ensure that you start an SSH session to the lab. Once connected, you should identify kernel version using this command:
Now, it's time to research and find the right, you can use like from Exploit Database or from exploit.asm file. Keep in mind that in a real penetration testing scenario, these exploits can potentially crash systems and cause service disruptions.
After that we can compile and run this exploit script to get the flag.

