In this video walkthrough, we went over a Linux box that is outdated. We navigated through the FTP server and executed our own commands. Then we escalated our privileges through overlayfs exploit.

Receive video documentation, QA and request special video training

Do you need private cybersecurity training? sign up here

CyberSecurity Consultation

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles