Mobile Application Security Labs
Kernel-Net
A in-kernel prototype inference engine for hosting mysterious models.
Outline
Outline
This challenge contains a custom vulnerable Android kernel driver with a memory corruption vulnerability, which can be exploited on Android 14 with kernel version 5.15.
Objective
Your goal is to escalate your privileges and obtain the flag located at
/data/vendor/secret/flag.txt, and provide the flag and exploitation steps to proof you cracked this challenge.
Validate your exploit against the local debug environment first; port it to the Corellium device only after successful validation on debug environment.
Skills Required
Validate your exploit against the local debug environment first; port it to the Corellium device only after successful validation on debug environment.
Skills Required
- Kernel debugging
- Familiar with kernel drivers and memory corruption bugs
- Proficiency in reverse engineering techniques for analyzing and understanding code.

Course Lessons
Copyright © 2024
Company
Mobile Hacking Lab B.V.
Registration:
97390453
VAT:
NL868032281B01
Registration:
97390453
VAT:
NL868032281B01