How attackers break into out-of-date kernels

Kernel Trouble

Article from Issue 285/2024
Author(s):

This deep look at how intruders attack an out-of-date kernel should be enough to convince you of the need to stay vigilant.

The multitudinous varieties of attacks that can affect OSs are hard to keep up with, but recently I wanted to test some Linux kernel exploits to keep up with my interest in ethical hacking. Such attacks often occur once access has been gained to a system. They are sometimes used in order to achieve privilege escalation – in other words, to boost a non-root user's privileges to the level of the root user in order to gain full control of the system.

It is easy to become content with the kernel you are running and forget to install all the updates and upgrade the system when the kernel is no longer supported. Many users install long-term support (LTS) Linux systems and get so used to them after five years that they aren't in a hurry to upgrade when the service cycle ends.

This article will introduce you to some techniques intruders use to attack old kernels, and, in case you ever had any doubts, it should convince you to never fall behind on those kernel patches and updates.

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Kernel Tips

    Worried about a recent security exploit? Want to take advantage of a new hardware feature? You don’t need to be a Linux expert to patch and compile the Linux kernel. We'll show you how to get started.

  • News

    In the news: Lenovo now offering Fedora Linux as an option; System76 launches new high-end kaptop; Mozilla lays off staff, receives more cash; VirtualBox now supports Linux Kernel 5.8; three major threats to Linux discovered; and Linux Kernel 5.8 is now available.

  • Stopping Drive-By Attacks

    You won't find a perfect solution to the growing problem of drive-by attacks, but many tools are available to help you keep malicious code off your network.

  • Kernel Protection

    Security vulnerabilities in the kernel often remain undetected. The kernel hacker initiative, Kernel Self-Protection, promotes safe programming techniques to keep attackers off the network, and, if they do slip through the net, mitigate the consequences.

  • NEWS

    Linux Kernel continues to offer mitigation for Spectre Mitigation, SpeakUp Trojan targets Linux servers, KDE Plasma 5.15 beta arrives, Canonical announces latest Ubuntu Core for IoT, vulnerabilities found in Cisco routers, two new malware campaigns, and US government shutdown ties up $139.2 million in grant funding.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News