Course
In this challenge, you will learn to escalate privileges by exploiting misconfigurations of the <code>sudo</code> command. You'll utilize the <code>find</code> command with the <code>-exec</code> option to either start a shell as the victim user or directly access the key file.
Skills covered
Injection
Operating System
Network
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.