Check For linux version , kernel version and architecture if it is vulnerable and then search exploit in seachsploit

to check version