Kernel Security


CSE 466 - Fall 2023.

The kernel is the core component of an operating system, serving as the bridge between software and hardware. Operating at the lowest level of the OS, the kernel's access is so profound that it can be likened to impersonating the system itself, surpassing even the highest privileges of a root user. Kernel security is paramount because a breach at this level allows attackers to act as if they are the system. Vulnerabilities can lead to scenarios like unauthorized data access, system crashes, or the silent installation of rootkits.


Ease into kernel exploitation with this simple crackme level!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with this simple crackme level!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level, this time with some privilege escalation (whoami?).

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level, this time with some privilege escalation (whoami?).

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level and learn how kernel devices communicate.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level and learn how kernel devices communicate.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize your hacker skillset to communicate with a kernel device and get the flag.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize your hacker skillset to communicate with a kernel device and get the flag.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a userspace binary to interact with a kernel device.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a userspace binary to interact with a kernel device.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device with KASLR enabled to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device with KASLR enabled to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score