Kernel Exploits
Gathering System and Kernel Information
To identify kernel-based vulnerabilities, first gather information about the operating system and Linux kernel version:
Searching for Exploits
Use searchsploit
to find local privilege escalation exploits that match the target system:
Important Note:
Compiling exploits on the target system is often more successful because the system libraries and dependencies are compatible with the exploit's requirements.
Last updated