Skip to content

Kernel vulnerability exploitation

Privilege escalation using a kernel exploit can be as simple as downloading, compiling, and running it. Some of these exploits work out of the box, while others require modification. A quick way to identify exploits is to issue the command uname -a and search Google for the kernel version.

uname -a
cat /etc/lsb-release 
System vulnerability Exploit
Ubuntu 16.04 LTS Exploit 39772
Ubuntu 18.04 LTS + lxd lxd privilege escalation
Last update: 2025-02-16
Created: May 23, 2023 19:56:20