Kernel Exploits
Gathering System and Kernel Information
To identify kernel-based vulnerabilities, first gather information about the operating system and Linux kernel version:
uname -r # Kernel version
cat /etc/os-release # Distro version
Searching for Exploits
Use searchsploit
to find local privilege escalation exploits that match the target system:
searchsploit <kernel_version> <distro_version> "Local Priv"
Last updated