You should complete Kernel Security module and Kernel Exploitation module before these challenges.
These challenges use /challenges/run.sh as a starting point.
They do not use vm script at all.
You might run /challenges/run.sh <bin path> to copy the exploit binary
to the vm. In most cases, the exploit binary should be statically compiled
since there is no glibc runtime inside the init rootfs.
There are hints encoded in base64. If you feel stuck after a day or two, feel free to take hints for new ideas. After all the dojo is to learn, not to score anyone.
In practice mode, to aid debugging, edit run.sh to modify qemu arguments:
nokaslr after the -append flag.-enable-kvm flag for better performance.-s flag for gdb port 1234.