Exploiting the Linux Kernel


Instructors:    Andrey Konovalov
Dates:  June 23 to 26 2025
Capacity:   20


A 4-day Linux kernel exploitation frenzy!

This training guides researchers through the field of Linux kernel exploitation. In a series of practical labs, the training explores the process of exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture.

The training is structured as a series of lectures, each followed by one or more hands-on labs. The goal of each lab is to write a Linux kernel exploit following the techniques described during the lecture.

The training starts with beginner topics but proceeds into advanced areas as well. The beginner chapters include learning how to escalate privileges and bypass foundational mitigations in x86-64 kernels. The advanced chapters are primarily dedicated to the modern slab (heap) exploitation techniques and include an in-depth analysis of the kernel allocators' internals.

The core requirement for this training is the ability to read and write C code. Basic knowledge of the x86-64 architecture and assembly, GDB, and the common binary exploitation techniques would also come in handy. There is no need to know any Linux kernel internals: all required parts are covered during the training.



KEY LEARNING OBJECTIVES




CLASS OUTLINE



Day 1 - Internals and exploitation basics:



Day 2 - Mitigation bypasses and slab exploitation basics:



Day 3 - Modern slab exploitation:



Day 4 - Advanced exploitation:


Prerequisites



The training is aimed at security researchers or software engineers desiring to enter or progress in the field of Linux kernel security.


Hardware Requirements



Software Requirements



Bio


Andrey Konovalov is a security researcher focusing on the Linux kernel.

Andrey found multiple zero-day bugs in the Linux kernel and published proof-of-concept exploits for these bugs to demonstrate the impact. Andrey contributed to several security-related Linux kernel subsystems and tools: KASAN - a fast dynamic bug detector; syzkaller - a production-grade kernel fuzzer; and Arm Memory Tagging Extension (MTE) - an exploit mitigation.

Andrey gave talks at security conferences such as OffensiveCon, Zer0Con, Android Security Symposium, Linux Security Summit, LinuxCon, and PHDays. Andrey also maintains a collection of Linux kernel security-related materials and a channel on Linux kernel security.

See xairy.io for all of Andrey's articles, talks, and projects.






To Register

Click here to register.