There are many motives for hacking, but nothing can be compared with the excitement of fully taking control of the systems. This can be done by exploiting the Linux kernel. Attacking the core of the system will make hackers feel on top of the world; that is why the kernel represents a high-priority target for every hacker.
Linux kernel exploitation
UserLand versus kernel land
Most operating systems rely on a ring protection model. This model represents superposed conceptual rings varying from high to low privileges. There are four layers numbered from 0 to 3:
- Ring 3: This layer is the usual interaction layer, with the user normally in the user mode.
- Ring 2: This layer contains operations with low privilege.
- Ring 1: This is...