Linux Privilege Escalations; sample of exploit chaining

Published: 31 May 2024
on channel: Jadi
1,021
52

In this example from NahamCon, after finding a command injection possibility in a C server, we drop ourselves in a shell. Then we will escalate our user privileges using a `lynx` browser by jumping into a VI editor and running another shell from there while being root.


Watch video Linux Privilege Escalations; sample of exploit chaining online without registration, duration hours minute second in high quality. This video was added by user Jadi 31 May 2024, don't forget to share it with your friends and acquaintances, it has been viewed on our site 1,021 once and liked it 52 people.