In this video walkthrough, we demonstrated basic enumeration of a Linux system. We performed command execution through a vulnerable ping form and then we did a privilege escalation by exploiting a security misconfiguration in sudo binary.
Receive video documentation, QA and request special video training
Do you need private cybersecurity training? sign up here