Kernel vulnerability exploitation
Privilege escalation using a kernel exploit can be as simple as downloading, compiling, and running it. Some of these exploits work out of the box, while others require modification. A quick way to identify exploits is to issue the command uname -a
and search Google for the kernel version.
System vulnerability | Exploit |
---|---|
Ubuntu 16.04 LTS | Exploit 39772 |
Ubuntu 18.04 LTS + lxd | lxd privilege escalation |