Binary-Kernel-Android-Exploitation-Roadmap

Labs - Binary Kernel and Android Exploitation Roadmap

Welcome to the Labs section of the Binary Kernel and Android Exploitation Roadmap. This directory contains several hands-on labs focused on kernel exploitation, Android kernel vulnerabilities, and post-exploitation techniques.

Each lab contains step-by-step instructions to help you set up a vulnerable kernel and explore different exploit chains. The labs are organized by CVEs, each designed to focus on a particular kernel vulnerability. Use this index to navigate through the labs.

Labs Index

Lab Description CVE Difficulty
Linux Kernel Write-What-Where Exploit a kernel module vulnerability to gain root via write-what-where technique. N/A Intermediate
Android Binder UAF - CVE-2020-0041 Recreate and analyze a real-world Android Binder kernel vulnerability (UAF). CVE-2020-0041 Advanced
Android Binder UAF - CVE-2019-2215 Exploit a Binder UAF vulnerability from CVE-2019-2215. CVE-2019-2215 Advanced

Lab Setup Instructions

Each lab contains a README.md with detailed instructions. However, to get started with any of the labs:

  1. Clone the Repository: ```bash git clone https://github.com/yourusername/Binary-Kernel-Android-Exploitation-Roadmap.git cd Binary-Kernel-Android-Exploitation-Roadmap/labs/

  2. Prepare the Vulnerable Kernel: Follow the specific fetch_and_build.sh script included in each lab folder to fetch, patch, and compile the kernel.

  3. Booting the Vulnerable Kernel: For Android labs, use QEMU to boot the kernel with the boot_qemu.sh script. Make sure to modify any paths to the root filesystem image or kernel as needed.

  4. Exploit Execution: Each lab comes with a proof-of-concept (PoC) exploit template. Follow the instructions in the poc/ folder to compile and run the exploit.

Caution: These labs are intended for educational purposes and should not be run on production devices.

Additional Information

Happy Exploiting!