How would an attacker remotely take over a personal Linux or Android device? Send a malicious link and get code execution through the browser? Or target a messenger or an email client? Well, how about sending a series of network packets and owning the kernel directly 😋 This article covers my experience with fuzzing the Linux kernel externally over the network. I’ll explain how I extended a kernel
![🔍 Looking for Remote Code Execution bugs in the Linux kernel](https://cdn-ak-scissors.b.st-hatena.com/image/square/b44f696e8a003fbb3969ad991176f5d6f3734dc0/height=288;version=1;width=512/https%3A%2F%2Fxairy.io%2Fimages%2Fcontent%2Fsyzkaller-external-network%2Fcover.jpg)