Kernel Security


System Security

The kernel is the core component of an operating system, serving as the bridge between software and hardware. Operating at the lowest level of the OS, the kernel's access is so profound that it can be likened to impersonating the system itself, surpassing even the highest privileges of a root user. Kernel security is paramount because a breach at this level allows attackers to act as if they are the system. Vulnerabilities can lead to scenarios like unauthorized data access, system crashes, or the silent installation of rootkits.


Lectures and Reading


Challenges

Ease into kernel exploitation with this simple crackme level!

Ease into kernel exploitation with this simple crackme level!

Ease into kernel exploitation with another crackme level.

Ease into kernel exploitation with another crackme level.

Ease into kernel exploitation with another crackme level, this time with some privilege escalation (whoami?).

Ease into kernel exploitation with another crackme level, this time with some privilege escalation (whoami?).

Ease into kernel exploitation with another crackme level and learn how kernel devices communicate.

Ease into kernel exploitation with another crackme level and learn how kernel devices communicate.

Utilize your hacker skillset to communicate with a kernel device and get the flag.

Utilize your hacker skillset to communicate with a kernel device and get the flag.

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Utilize a userspace binary to interact with a kernel device.

Utilize a userspace binary to interact with a kernel device.

Exploit a buggy kernel device to get the flag!

Exploit a buggy kernel device to get the flag!

Exploit a buggy kernel device with KASLR enabled to get the flag!

Exploit a buggy kernel device with KASLR enabled to get the flag!

Exploit a kernel device utilizing a userspace binary, with a twist!

Exploit a kernel device utilizing a userspace binary, with a twist!

Exploit a kernel device utilizing a userspace binary, with a twist!

Exploit a kernel device utilizing a userspace binary, with a twist!


Module Ranking

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score