Summary
In this chapter, we started by identifying and running kernel exploits automatically with the Metasploit framework. We then looked at how to identify and transfer kernel exploits manually. We ended this chapter by taking a look at how to execute kernel exploits on the target system successfully to elevate our privileges.
Now that we have learned how to perform kernel exploitation on Linux systems, we can begin exploring other Linux privilege escalation vectors.
In the next chapter, we will explore the process of mining and searching for locally stored passwords on Linux and how this can lead to successful privilege escalation.