Kernel Module Abuse
Table of contents
Prerequisites
- Low privileged access to the Linux target
Exploit
First, get information about your target system.
# Linux version
cat /etc/issue
# Kernel version
uname -r
# CPU architecture
arch
Once you have all prerequisites in mind, use searchsploit
, or anything else, to find your exploit.