Kernel Exploits

What is Kernel

Escalation with Metasploit

Check for exploits

Syntax Breakdown

  • run: A Meterpreter command used to execute a script or a post-exploitation module within the current session.

  • post/: Indicates that this is a post-exploitation module, designed to be used after a system has already been compromised.

  • multi/recon/: Specifies the category of the module. Multi means it works across multiple platforms (e.g., Windows, Linux, Android), and Recon indicates it is used for reconnaissance/gathering information.

  • local_exploit_suggester: The specific name of the module (sometimes nicknamed "Lester").

Kitrapod is very good. Try it for a few times

Kitrap0d Information - https://seclists.org/fulldisclosure/2010/Jan/341

Manual Kernel Exploitation

MS10-059 Exploit - https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS10-059

Last updated