Premise
In this video walk-through, we demonstrated basic enumeration of a Linux system. We performed command execution through a vulnerable ping form and then we did a privilege escalation by exploiting a security mis-configuration in sudo binary.
Machine Name: Unroot
Difficulty: Beginner
Skills Learned
- Command Injection
- OWASP
- Sudo Exploitation
Video Walk-through
Show Comments