Kernel Vulnerabilities
Exploiting Kernel Vulnerabilities
In order to successfully exploit kernel vulnerabilities we often have to match the vulnerable kernel version with the proper distro of Linux.
Enumeration
Here are some commands to figure out everything you need to know about the host system.
Searching For Vulnerabilities
We need to be specific and PATIENT with our searching. It's very important to figure out the main keywords for our search.
Searchsploit
Google
Last updated