Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Overview
We discussed two major kernel vulnerabilities in great detail in Chapter 23; in this chapter, we will move on to the exploitation of these vulnerabilities. A primary concern with exploiting vulnerabilities, especially kernel vulnerabilities, is reachability . Let's examine some creative methods of doing so with the OpenBSD vulnerability described in Chapter 23.