Mobile Application Security Labs 

Kernel-Net

A in-kernel prototype inference engine for hosting mysterious models.

Outline
This challenge contains a custom vulnerable Android kernel driver with a memory corruption vulnerability, which can be exploited on Android 14 with kernel version 5.15.

Objective
Your goal is to escalate your privileges and obtain the flag located at
/data/vendor/secret/flag.txt, and provide the flag and exploitation steps to proof you cracked this challenge.

Validate your exploit against the local debug environment first; port it to the Corellium device only after successful validation on debug environment.

Skills Required
  • Kernel debugging
  • Familiar with kernel drivers and memory corruption bugs
  • Proficiency in reverse engineering techniques for analyzing and understanding code.

    Course Lessons