Premise

In this video walk-through, we demonstrated basic enumeration of a Linux system. We performed command execution through a vulnerable ping form and then we did a privilege escalation by exploiting a security mis-configuration in sudo binary.

Machine Name: Unroot

Difficulty: Beginner

Skills Learned

  • Command Injection
  • OWASP
  • Sudo Exploitation

Get OSCP Certificate Notes

Video Walk-through

About the Author

I create cybersecurity notes, digital marketing notes and online courses. I also provide digital marketing consulting including but not limited to SEO, Google & Meta ads and CRM administration.

View Articles