In this video walkthrough, we went over a Linux box that is outdated. We navigated through the FTP server and executed our own commands. Then we escalated our privileges through overlayfs exploit.

Receive video documentation, QA and request special video training

https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join

Do you need private cybersecurity training? sign up here

CyberSecurity Consultation



About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles