Unix 29

Bookmarked!

This exercise is one of our challenges to help you learn more about Unix/Linux

PRO
Tier
difficulty_easy_icon
Easy
clock icon
< 1 Hr.
number of users completed icon
14306
badge icon
Unix Badge

This challenge focuses on privilege escalation by exploiting misconfigurations in the sudo command. You'll log in with the credentials "pentesterlab" and use sudo -l to list authorized commands. The goal is to either read a file containing a key or gain a shell as the user "victim."

To read the file, you can specify the file's path directly on the command line using awk '{print $0}' /home/victim/key.txt. Alternatively, to gain a shell as the user "victim," you can use awk '{system("/bin/bash")}'. Understanding how to manipulate sudo configurations can be crucial for ethical hacking and system auditing.

Want to learn more? Get started with PentesterLab Pro! GOPRO