Local Root Exploits
So-called local root exploits often exist especially for older operating systems, which exploit vulnerabilities in the kernel when expanding privileges, such as a buffer overflow or a race condition. As an example, we might have encountered the kernel “3.19.0-15-generic“ while collecting information and would then search the internet for known exploits of this kernel version. The Offensive Security’s Exploit Database Archive (https://www.exploit-db.com/) is one method that is well suited for this purpose. By conducting the following Google search, we will get several hits or exploits, which we could use against this kernel:
site:exploit-db.com 3.19 local root exploit
In general, the source code of exploits is almost always in the high-level C language and must “only“ be compiled into an executable programme by us. It is possible that the target system for the build process does not have all the necessary libraries, which then requires us to statically “build“ the local root exploit on our attacker machine. Static linking integrates the required files into the executable programme, allowing us to achieve increased portability. For example, we can accomplish this with the following gcc command:
gcc -static ${source file} -o ${executable}
When compiling on our attacker machine, we still have to consider the system architecture of our target system. If our target system is based on an x86 processor (32-bit architecture) and our own system is based on the 64-bit architecture, we must conduct cross-compiling:
gcc -march=i386 ${source file} -o ${executable}
Pentest Training
Take a look at the pentest training chapters and learn penetration testing:
- Preface
- Introduction
- Legal Framework
- Hacking vs. Penetration Testing
- Classification
- Meaningfulness of Penetration Tests
- Penetration Testing Standards
- The Hacking Guide
- Hacking I: Scanning networks
- Hacking II: Password attacks
- Hacking III: Web application attacks
- Hacking IV: Privilege Escalation
- Hacking V: Tunnelling Techniques
- Hacking VI: Vulnerability scanner and penetration testing frameworks
- Demonstration of a Penetration Test
- Risk Assessment of Identified Vulnerabilities
- Structure of Documentation and Reporting
- Insider stories: Tales from Dubius Payment Ltd.
binsec academy GmbH - Online IT Security Training with Practical Focus
binsec academy GmbH is provider of online IT security training, offering practical, lab-based courses for professionals. The academy provides hands-on training in areas such as penetration testing and secure software development. Participants gain practical experience through realistic lab environments, including simulations of company networks and applications. Courses are available in multiple programming languages and align with standards like OWASP Top 10 and PCI DSS. Upon successful completion, participants receive certifications such as the Binsec Academy Certified Pentest Professional (BACPP) and Binsec Academy Certified Secure Coding Professional (BACSCP), demonstrating their ability to identify and remediate security vulnerabilities.
Goto binsec acadmy GmbH

binsec GmbH – Experts in Penetration Testing
binsec GmbH is a German IT security company focused on professional penetration testing. With over 10 years of experience, the team conducts in-depth penetration tests on networks, web applications, APIs, and mobile apps. Certified experts systematically identify and document security vulnerabilities to support organizations in improving their security and meeting compliance requirements.
Goto binsec GmbH