Kernel Exploitation
Often leads to root access
Kernels are the core of any operating system.
Think of it as a layer between application software and the actual computer hardware.
The kernel has complete control over the operating system. Exploiting a kernel vulnerability can result in execution as the root user.
Finding kernel exploit
Enumerate kernel version -
uname -a
Find matching exploits ( Google, ExploitDB, Github)
Compile and run.
note: Beware though, as Kernel exploits can often be unstable and may be one-shot or cause a system crash.
Linux Local Exploit
Other exploits
Linux Kernel 2.6.39 - 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation:
CVE-2012-0056
Linux Kernel 2.6.22 - 3.9 (x86/x64) - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (SUID Method):
CVE-2016-5195
Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation
CVE-2003-0127
Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV below 1.4.1 - Local Privilege Escalation (1)
exploit/linux/local/udev_netlink
Exploits worth running
Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation
CVE-2010-3904 - Linux RDS Exploit - Linux Kernel <= 2.6.36-rc8
Linux Kernel <= 2.6.37 'Full-Nelson.c'
CVE-2012-0056 - Mempodipper - Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64)
Linux CVE 2012-0056
CVE-2016-5195 - Dirty Cow - Linux Privilege Escalation - Linux Kernel <= 3.19.0-73.8
Compile dirty cow:
Cross compiling exploits
Linux 2.6.32
Elevation in 2.6.x:
Last updated