Premise

In this video walk-through, we demonstrated basic enumeration of a Linux system. We performed command execution through a vulnerable ping form and then we did a privilege escalation by exploiting a security mis-configuration in sudo binary.

Machine Name: Unroot

Difficulty: Beginner

Skills Learned

  • Command Injection
  • OWASP
  • Sudo Exploitation

Video Walk-through

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles