In this video walkthrough, we demonstrated basic enumeration of a Linux system. We performed command execution through a vulnerable ping form and then we did a privilege escalation by exploiting a security misconfiguration in sudo binary.

Receive video documentation, QA and request special video training

https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join

Do you need private cybersecurity training? sign up here

CyberSecurity Consultation



About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles