Imagin you forgot your root password after a long vacation at work or you are new to a company and need to get care of old systems with no known credentials or documentation of the system. So what do you do? – Reinstall the hole machine would be a solution but all data will be …
While infilatrating a system it is mostly necessary no escalate your privileges to another user or the root user. While learning about priv-esc on linux-system I often used a simple technique which is based on misconfigured binarys. For example if a lower priv user is allowed to run a program with sudo and no password …
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkNoPrivacy policy