pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to software-exploitation

Kernel Exploitation

software-exploitation
0/8 challenges completed

You've taken your first steps into kernel exploitation with Kernel Security.

Are you ready to kick your knowledge up a notch to understand how real-world Linux kernel exploitation is done?

This module will provide you with the guide that you need to become an expert in Linux kernel exploitation.

Note 1: this is a kernel exploitation module, and requires you to run vm connect to drop into the virtual machine where the challenge is running. You can get logs using vm logs and (in Practice Mode) debug the kernel using vm debug.

Note 2: for technical reasons, we had to disable virtualization on this module. The VM will be slow --- consider doing heavy tasks like compiling in the normal workspace (e.g., in a terminal where you have not done vm connect).

Slab Allocators
Video
Slides
Kernel Heap Protections
Video
Slides
Exploiting the Kernel
Video
Slides
Recommended Reading

Challenges

1
Level-1
2
Level-2
3
Level-3
4
Level-4
5
Level-5
6
Level-6
7
Level-7
8
Level-8