{"id":34628,"date":"2024-08-28T10:37:51","date_gmt":"2024-08-28T10:37:51","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=34628"},"modified":"2024-08-28T10:37:53","modified_gmt":"2024-08-28T10:37:53","slug":"collateral-damage","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/","title":{"rendered":"Collateral Damage &#8211; Unveiling The Xbox Kernel Exploit"},"content":{"rendered":"\n<p>Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30088\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-30088<\/a>. It targets Xbox One and Xbox Series consoles running kernel versions 25398.4478, 25398.4908, and 25398.4909. <\/p>\n\n\n\n<p>The initial entrypoint is via the Game Script UWP application.<\/p>\n\n\n\n<p>The first stage payloads, PE loader and network loader are provided by\u00a0<a href=\"https:\/\/github.com\/exploits-forsale\/solstice\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Solstice<\/a>.<\/p>\n\n\n\n<p>This exploit was developed by\u00a0<a href=\"https:\/\/x.com\/carrot_c4k3\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Emma Kirkpatrick<\/a>\u00a0(vulnerability discovery &amp; exploitation) and\u00a0<a href=\"https:\/\/x.com\/landaire\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Lander Brandt<\/a>\u00a0(Solstice)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Important Caveats<\/strong><a href=\"https:\/\/github.com\/exploits-forsale\/collateral-damage#important-caveats\"><\/a><\/h2>\n\n\n\n<p>To place the payload locally on the Xbox console a full-trust explorer like\u00a0<a href=\"https:\/\/apps.microsoft.com\/detail\/9nbnjpsxfsqb\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adv File Explorer (FullTrust)<\/a>\u00a0is recommended. <\/p>\n\n\n\n<p>Alternatively, the initial payload can be served via a USB keyboard simulator (rubber ducky etc.) and further payload stages can then be loaded over the network.<\/p>\n\n\n\n<p>The reverse shell example provided here requires that your console is connected to a network. When connecting your console to a network be very careful to avoid connecting to the internet and updating. <\/p>\n\n\n\n<p>Try to block connectivity to Xbox LIVE as much as possible, at the very least by setting your DNS to invalid servers.<\/p>\n\n\n\n<p>This exploit is not fully reliable. It relies on a CPU side channel as well as a race condition, both of which have the potential to fail. <\/p>\n\n\n\n<p>In the event of a failure, the exploit may alert you that it has failed via network output, or the console itself may crash and reboot.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><a href=\"https:\/\/github.com\/exploits-forsale\/collateral-damage#usage\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Modify line 7 of\u00a0<code>gamescript_autosave_network.txt<\/code>\u00a0or\u00a0<code>gamescript_autosave.txt<\/code>\u00a0to contain the local IP of your PC.\n<ul class=\"wp-block-list\">\n<li>For use with Full-Trust File Explorer App: Copy\u00a0<code>gamescript_autosave.txt<\/code>,\u00a0<code>stage2.bin<\/code>, and\u00a0<code>run.exe<\/code>\u00a0to the\u00a0<code>LocalState<\/code>\u00a0directory of the Game Script application on your Console (<code>Q:\\Users\\UserMgr0\\AppData\\Local\\Packages\\27878ConstantineTarasenko.458004FD2C47C_c8b3w9r5va522\\LocalState\\<\/code>)<\/li>\n\n\n\n<li>For HID \/ Keyboard simulator input: Type the contents of\u00a0<code>gamescript_autosave_network.txt<\/code>\u00a0into the GameScript window. Serve\u00a0<code>stage2.bin<\/code>\u00a0and\u00a0<code>run.exe<\/code>\u00a0via\u00a0<code>payload_server_win_x64.exe --stage2 stage2.bin --run run.exe<\/code><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Listen on port 7070 on your PC using netcat or a similar tool (command example:\u00a0<code>nc64.exe -lvnp 7070<\/code>)<\/li>\n\n\n\n<li>Open the Game Script application on your console and select &#8220;Show Code Run window&#8221; and click &#8220;Run code once&#8221;<\/li>\n\n\n\n<li>If the exploit is success you should see output on your PC that resembles the following:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>listening on &#91;any] 7070 ...\nconnect to &#91;192.168.0.61] from (UNKNOWN) &#91;192.168.0.130] 49665\nCollateral Damage - @carrot_c4k3 &amp; @landaire (exploits.forsale)\nBuild number: 25398.4478\nAttempting to find kernel base...\nFound likely kernel base: FFFFF80AF9800000\nAttempting exploit...\nExploit succeeded! Running payload!\n\nMicrosoft Windows &#91;Version 10.0.25398.4478]\nCopyright (c) Microsoft Corporation. All rights reserved.\n\nS:\\><\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel versions 25398.4478, 25398.4908, and 25398.4909. The initial entrypoint is via the Game Script UWP application. The first stage payloads, PE loader and network loader are provided by\u00a0Solstice. This exploit was developed by\u00a0Emma Kirkpatrick\u00a0(vulnerability discovery &amp; [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":34632,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[6908,737,6321,6052,6325],"class_list":["post-34628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-et","tag-collateral-damage","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Collateral Damage - Unveiling The Xbox Kernel Exploit<\/title>\n<meta name=\"description\" content=\"Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Collateral Damage - Unveiling The Xbox Kernel Exploit\" \/>\n<meta property=\"og:description\" content=\"Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-28T10:37:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-28T10:37:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Collateral Damage &#8211; Unveiling The Xbox Kernel Exploit\",\"datePublished\":\"2024-08-28T10:37:51+00:00\",\"dateModified\":\"2024-08-28T10:37:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/\"},\"wordCount\":323,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp\",\"keywords\":[\"Collateral Damage\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Exploitation Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/\",\"name\":\"Collateral Damage - Unveiling The Xbox Kernel Exploit\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp\",\"datePublished\":\"2024-08-28T10:37:51+00:00\",\"dateModified\":\"2024-08-28T10:37:53+00:00\",\"description\":\"Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Collateral Damage - Unveiling The Xbox Kernel Exploit","description":"Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/","og_locale":"en_US","og_type":"article","og_title":"Collateral Damage - Unveiling The Xbox Kernel Exploit","og_description":"Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel","og_url":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-08-28T10:37:51+00:00","article_modified_time":"2024-08-28T10:37:53+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Collateral Damage &#8211; Unveiling The Xbox Kernel Exploit","datePublished":"2024-08-28T10:37:51+00:00","dateModified":"2024-08-28T10:37:53+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/"},"wordCount":323,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","keywords":["Collateral Damage","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Exploitation Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/collateral-damage\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/","url":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/","name":"Collateral Damage - Unveiling The Xbox Kernel Exploit","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","datePublished":"2024-08-28T10:37:51+00:00","dateModified":"2024-08-28T10:37:53+00:00","description":"Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/collateral-damage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":37198,"url":"https:\/\/kalilinuxtutorials.com\/remote-lua-loader\/","url_meta":{"origin":34628,"position":0},"title":"Remote Lua Loader : Mastering PS4 And PS5 Exploits With Advanced Scripting","author":"Varshini","date":"March 21, 2025","format":false,"excerpt":"The Remote Lua Loader is a tool designed to exploit vulnerabilities in games built with the Artemis game engine, which utilizes Lua scripting. This exploit allows users to load arbitrary Lua files onto their PS4 or PS5 consoles, potentially paving the way for future kernel exploits. Key Features Firmware Independence:\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Remote-Lua-Loader.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Remote-Lua-Loader.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Remote-Lua-Loader.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Remote-Lua-Loader.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Remote-Lua-Loader.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Remote-Lua-Loader.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36806,"url":"https:\/\/kalilinuxtutorials.com\/ps5-umtx-jailbreak\/","url_meta":{"origin":34628,"position":1},"title":"PS5 UMTX Jailbreak : Comprehensive Guide And Analysis","author":"Varshini","date":"March 3, 2025","format":false,"excerpt":"The PS5 UMTX Jailbreak is a webkit-based kernel exploit developed by SpecterDev and other contributors, designed to unlock specific features of the PlayStation 5. This tool primarily targets firmware versions up to 5.50, with earlier versions (1.xx and 2.xx) being more stable. Here\u2019s an overview of its functionality and features:\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/PS5-UMTX-Jailbreak.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/PS5-UMTX-Jailbreak.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/PS5-UMTX-Jailbreak.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/PS5-UMTX-Jailbreak.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/PS5-UMTX-Jailbreak.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/PS5-UMTX-Jailbreak.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35886,"url":"https:\/\/kalilinuxtutorials.com\/sunder\/","url_meta":{"origin":34628,"position":2},"title":"Sunder : A Windows Rootkit Exploiting Vulnerable Drivers For Kernel-Level Attacks","author":"Varshini","date":"January 30, 2025","format":false,"excerpt":"Sunder is a Windows rootkit inspired by the Lazarus Group's FudModule rootkit, designed to exploit vulnerabilities in kernel drivers to gain unauthorized access to system resources. This rootkit serves as a framework for post-exploitation activities, leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to bypass security mechanisms and manipulate\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36876,"url":"https:\/\/kalilinuxtutorials.com\/trigon\/","url_meta":{"origin":34628,"position":3},"title":"Trigon : A Revolutionary Kernel Exploit For iOS","author":"Varshini","date":"March 6, 2025","format":false,"excerpt":"Trigon is a sophisticated deterministic kernel exploit targeting Apple\u2019s iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie CG and collaborators, introduces a groundbreaking approach to kernel exploitation by ensuring reliability and stability during and after execution. Unlike traditional methods prone to instability, Trigon guarantees deterministic outcomes, making\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Trigon-1.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37282,"url":"https:\/\/kalilinuxtutorials.com\/osce%c2%b3-and-osee-study-guide\/","url_meta":{"origin":34628,"position":4},"title":"OSCE\u00b3 and OSEE Study Guide : Understanding Key Tools And Functions","author":"Varshini","date":"March 25, 2025","format":false,"excerpt":"The OSCE\u00b3 (Offensive Security Certified Expert 3) and OSEE (Offensive Security Exploitation Expert) certifications are advanced qualifications in the field of cybersecurity, focusing on web security and exploit development, respectively. Both certifications require a deep understanding of various tools and methodologies used in penetration testing and exploit development. OSCE\u00b3 Study\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCE%C2%B3-and-OSEE-Study-Guide-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCE%C2%B3-and-OSEE-Study-Guide-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCE%C2%B3-and-OSEE-Study-Guide-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCE%C2%B3-and-OSEE-Study-Guide-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCE%C2%B3-and-OSEE-Study-Guide-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCE%C2%B3-and-OSEE-Study-Guide-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36819,"url":"https:\/\/kalilinuxtutorials.com\/cve-2025-21333-poc\/","url_meta":{"origin":34628,"position":5},"title":"CVE-2025-21333-POC : An In-Depth Exploration Of Windows Kernel Exploitation Techniques","author":"Varshini","date":"March 4, 2025","format":false,"excerpt":"The CVE-2025-21333 Proof of Concept (PoC) demonstrates an exploit targeting a vulnerability in the vkrnlintvsp.sys driver on Windows systems. This article delves into the tools, techniques, and functionality of the PoC, providing insights into its operation and limitations. Overview Of CVE-2025-21333 CVE-2025-21333 is a kernel vulnerability actively exploited by threat\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CVE-2025-21333-POC.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CVE-2025-21333-POC.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CVE-2025-21333-POC.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CVE-2025-21333-POC.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CVE-2025-21333-POC.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CVE-2025-21333-POC.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=34628"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34628\/revisions"}],"predecessor-version":[{"id":34634,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34628\/revisions\/34634"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/34632"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=34628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=34628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=34628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}