Welcome to the Labs section of the Binary Kernel and Android Exploitation Roadmap. This directory contains several hands-on labs focused on kernel exploitation, Android kernel vulnerabilities, and post-exploitation techniques.
Each lab contains step-by-step instructions to help you set up a vulnerable kernel and explore different exploit chains. The labs are organized by CVEs, each designed to focus on a particular kernel vulnerability. Use this index to navigate through the labs.
| Lab | Description | CVE | Difficulty |
|---|---|---|---|
| Linux Kernel Write-What-Where | Exploit a kernel module vulnerability to gain root via write-what-where technique. | N/A | Intermediate |
| Android Binder UAF - CVE-2020-0041 | Recreate and analyze a real-world Android Binder kernel vulnerability (UAF). | CVE-2020-0041 | Advanced |
| Android Binder UAF - CVE-2019-2215 | Exploit a Binder UAF vulnerability from CVE-2019-2215. | CVE-2019-2215 | Advanced |
Each lab contains a README.md with detailed instructions. However, to get started with any of the labs:
Clone the Repository: ```bash git clone https://github.com/yourusername/Binary-Kernel-Android-Exploitation-Roadmap.git cd Binary-Kernel-Android-Exploitation-Roadmap/labs/
Prepare the Vulnerable Kernel:
Follow the specific fetch_and_build.sh script included in each lab folder to fetch, patch, and compile the kernel.
Booting the Vulnerable Kernel:
For Android labs, use QEMU to boot the kernel with the boot_qemu.sh script. Make sure to modify any paths to the root filesystem image or kernel as needed.
Exploit Execution:
Each lab comes with a proof-of-concept (PoC) exploit template. Follow the instructions in the poc/ folder to compile and run the exploit.
Caution: These labs are intended for educational purposes and should not be run on production devices.
Happy Exploiting!