Kernel Exploits
Gathering System and Kernel Information
To identify kernel-based vulnerabilities, first gather information about the operating system and Linux kernel version:
Searching for Exploits
Use searchsploit
to find local privilege escalation exploits that match the target system:
Last updated