Linux Kernel Hacking Basics
10.0
(2)
Tier 3 Hard Skill Path System Hacking
Set up environments for Linux kernel hacking, and learn about mitigation techniques and vulnerabilities through hands-on exercises. Additionally, explore how exploits are designed and implemented through CVE analysis.
Linux Kernel Hacking Basics
10.0
(2)
Tier 3 Hard Skill Path System Hacking
Set up environments for Linux kernel hacking, and learn about mitigation techniques and vulnerabilities through hands-on exercises. Additionally, explore how exploits are designed and implemented through CVE analysis.
0% Completed Total 0 completed
Lecture 0 /18
18
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.

Why It's Worth Your Time

The Linux kernel is the core of the Linux operating system, acting as the intermediary between hardware and software while efficiently managing resources such as processes, memory, file systems, I/O devices, and networks. As a massive open-source project with over 20 million lines of code, the kernel inevitably contains numerous security vulnerabilities. Although modern defenses like KASLR, SMEP/SMAP, and KPTI have been introduced, new kernel vulnerabilities are still discovered each year, many of which form the basis for zero-day attacks, kernel rootkits, and advanced exploitation techniques.
This Path is designed to provide hands-on experience bypassing kernel mitigations and exploiting critical vulnerabilities to achieve Local Privilege Escalation (LPE) in a QEMU-based environment. If you aim to showcase Linux kernel exploits at world-class competitions like Pwn2Own or KernelCTF, this Path will serve as a strong starting point.

Topics Covered

  • Building an exercise environment using QEMU and BusyBox and learning kernel debugging techniques
  • Analyzing key kernel protections such as KASLR, SMEP/SMAP, SSP, and KPTI
  • Studying and exploiting major kernel vulnerabilities like stack buffer overflow, Use-After-Free, heap overflow, and race conditions
  • Exploiting kernel structures like kmalloc, pipe_buffer, msg_msg, and simple_xattr
  • Researching CVE-2022-34918, a real-world kernel vulnerability case

Recommended For

  • Aspiring white-hat hackers, vulnerability researchers, and bug bounty hunters
  • Those interested in Linux kernel vulnerability analysis
  • Those aiming to solve advanced CTF problems or analyze one-day/zero-day vulnerabilities

Prerequisite Knowledge

  • Strong knowledge of system hacking
  • Experience in reverse engineering
  • Understanding of Linux OS structure and internals
  • Development and debugging experience in a Linux environment
  • Familiarity with tools like GDB and QEMU
Unit Composition
Total 5 units
  1. 1
    9.7
    (40)
    9.7
    (40)
    Explore Linux kernel fundamentals, building, and debugging using QEMU and GEF.
    Linux Kernel
    Linux Kernel Basics
    Environment Setup
    Linux Kernel Image
    QEMU & BusyBox
    Kernel Debugging
  2. 2
    9.7
    (19)
    1300 Coin
    9.7
    (19)
    1300 Coin
    Explore Linux kernel protection techniques and privilege escalation methods.
    Mitigations
    Mitigations
    Types of Mitigations
    KASLR
    SMEP/SMAP
    SSP
    KPTI
  3. 3
    1050 Coin
    9.9
    (10)
    1050 Coin
    Explore Linux kernel vulnerabilities including stack-based BOF, UAF, heap overflow, and race conditions.
    Types of Vulnerabilities
    Stack based BOF
    Use-After-Free
    Heap Overflow
    Race Condition
  4. 4
    8.7
    (7)
    1050 Coin
    8.7
    (7)
    1050 Coin
    Learn various exploitation techniques that target vulnerabilities in the Linux kernel.
    kmalloc & kmalloc-cg
    kmalloc-*
    msg_msg
    msg_msg
    pipe_buffer
    pipe_buffer
    simple_xattr
    simple_xattr
  5. 5
    250 Coin
    10.0
    (2)
    250 Coin
    Explore the CVE-2022-34918 vulnerability in Linux's Netfilter and learn exploitation techniques.
    CVE-2022-34918
    CVE-2022-34918
Reviews
10.0 (2)
2 months ago

리눅스 커널 익스플로잇을 입문하기가 어려웠는데 빌드 과정부터 디버깅 방법까지 체계적으로 설명해주어서 좋았습니다. 또한 heap spraying에 쓰이는 kernel 객체들에 대해 자세히 설명해주어서 큰 도움이 되었습니다. linux kernel hacking advanced 출시가 기대되네요 ㅎㅎ

4 months ago

Kernel에 관심이 있으시다면, 입문하기 좋다고 생각합니다.

0% Completed Total 0 completed
Lecture 0 /18
18
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.