✅
Penetration Testing
  • Introduction
  • Methodology
  • Port Scanning
    • Ports and Associated Service
    • Nmap Port States
    • Nmap Scanning
  • Service Enumeration
    • SMB
    • HTTP 80,443
      • Sub-Domain Enumeration
      • Authentication Bypassing
      • Directory Busting
  • Reverse Shells
    • Reverse shell Cheatsheets
    • Msfvenom to get Reverse Shell
    • Spawning Shells - TTY Shells
    • Listener Setup
    • Python pty shells
    • Stabilizing shell
  • Linux Privilege Escalation
    • Enumeration
    • Automated Enumeration Tools
    • Kernel Exploits
    • Weak File Permissions
    • Sudo
    • Cron Job
    • SUID /SGID
    • Passwords and Keys
    • NFS
  • PENETRATION TESTING REPORT RESOURCES
    • Resources
  • OSCP Like Machines Walkthrough
    • HACKTHEBOX
      • Linux
      • Windows
      • Harder than OSCP
Powered by GitBook
On this page
  1. Linux Privilege Escalation

Kernel Exploits

The kernel communicates between memory and system applications, to perfom these tasks the kernel requires root privileges, therefore exploiting the kernel might give us the root privileges

PreviousAutomated Enumeration ToolsNextWeak File Permissions

Last updated 2 years ago

How to perform?

1 Identify the kernel version - You will find the version in the initial Enumeration phase 2 Search and find a suitable exploit for the kernel 3 Run the exploit

Commands to find the kernel version

uname -a
cat /proc/version

Where to look for the exploits?

1 Google for an existing exploit code 2 Exploit-db 3 searchsploit 4 Source - 5 Running script like Linux Exploit Suggester (LES)

These scripts generate false results as well

https://www.linuxkernelcves.com/cves