Skip to content

Kernel development & exploitation practice environment.

License

Notifications You must be signed in to change notification settings

p4zuu/pwnkernel

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Linux kernel exploit easy setup

This is a simple fork from pwnkernel. I just adapted and removed a few things to make it specific to kernel exploit development.

Dependencies

sudo apt-get -q update
sudo apt-get -q install -y bison flex libelf-dev cpio build-essential libssl-dev qemu-system-x86

Kernel version

A KERNEL_VERSION variable is set up in build.sh.

Building

Building the kernel and busybox:

./build.sh

KASAN

By default, the kernel is built with KASAN to make bug triggering easier. Comment the following line to build it normally:

  echo "CONFIG_KASAN=y" >> linux-$KERNEL_VERSION/.config

Feel free to add other sanitizers :^)

Running

Running the kernel:

./launch.sh
Usage: ./launch [arguments]

Arguments:
  -D <path>     directory to mount in VM
  -d            debug mode (add -S in QEMU)

The host directory specified by the -D argument will be mounted inside /home/ctf guest directory.

About

Kernel development & exploitation practice environment.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%