Kernel Security


System Security.

The kernel is the core component of an operating system, serving as the bridge between software and hardware. Operating at the lowest level of the OS, the kernel's access is so profound that it can be likened to impersonating the system itself, surpassing even the highest privileges of a root user. Kernel security is paramount because a breach at this level allows attackers to act as if they are the system. Vulnerabilities can lead to scenarios like unauthorized data access, system crashes, or the silent installation of rootkits.

In order to get started on kernel challenges, you will need to run the challenges inside a virtual machine. You can start this VM done by running a command while at a terminal, vm start. The virtual machine will automatically load the kernel module located in the /challenge directory. You can then connect your terminal to this virtual machine with vm connect!


These challenges need to be solved in a virtual machine! You can launch with the virtual machine using the vm command, then interact with the challenges.


Challenges

Ease into kernel exploitation with this simple crackme level!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with this simple crackme level!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level, this time with some privilege escalation (whoami?).

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level, this time with some privilege escalation (whoami?).

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level and learn how kernel devices communicate.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Ease into kernel exploitation with another crackme level and learn how kernel devices communicate.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize your hacker skillset to communicate with a kernel device and get the flag.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize your hacker skillset to communicate with a kernel device and get the flag.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a 'buggy' kernel device and shellcode to escalate privileges to root and get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a userspace binary to interact with a kernel device.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a userspace binary to interact with a kernel device.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device with KASLR enabled to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a buggy kernel device with KASLR enabled to get the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a kernel device utilizing a userspace binary, with a twist!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score