In this video walkthrough, we demonstrated basic enumeration of a Linux system. We performed command execution through a vulnerable ping form and then we did a privilege escalation by exploiting a security misconfiguration in sudo binary.

Receive video documentation, QA and request special video training

Do you need private cybersecurity training? sign up here

CyberSecurity Consultation

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles