Kernel Module Abuse

Table of contents

  1. Prerequisites
  2. Exploit

Prerequisites

  • Low privileged access to the Linux target

Exploit

First, get information about your target system.

# Linux version
cat /etc/issue

# Kernel version
uname -r

# CPU architecture
arch

Once you have all prerequisites in mind, use searchsploit, or anything else, to find your exploit.