In this video walkthrough, we went over a Linux box that is outdated. We navigated through the FTP server and executed our own commands. Then we escalated our privileges through overlayfs exploit.
Receive video documentation, QA and request special video training
Do you need private cybersecurity training? sign up here