Skip to content

clankhead/kernel-sanders

Repository files navigation

kernel-sanders 🐔

TEAM - Alice and Bob

kernel-sanders is a security capstone project implementing a full, automated attack chain against a hardened AArch64 Linux target, from initial code execution via a vulnerable network service, through kernel privilege escalation, to persistent kernel-level compromise via a custom loadable rootkit with a covert C2 channel, process/file hiding, shellcode injection, and encrypted exfiltration.


Documentation

  • How to Run -+ build instructions, VM setup, running the exploit chain, and C2 usage
  • Writeup -+ full technical writeup covering design decisions, implementation details, and attack chain walkthrough
  • Key Bugs & Fixes -+ notable bugs encountered during development
  • Design Changes -+ design-level changes made to resolve bugs (scheduling-while-atomic, path normalization, symlink blocking)
  • [Poster] -+ poster that was shown during the poster session.
  • COLDSPARK -+ Mission briefing from instructor.

Attack Chain Overview

kernel-sanders implements a 4-stage attack chain against MERIDIAN Defense Group's "Secure Terminal Service":

image

Poster

The poster we showed at the poster session. Download a pdf version here.

Kernel Sanders

About

Multi-stage kernel exploit with userland shellcode

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors