Unix 29
This exercise is one of our challenges to help you learn more about Unix/Linux
This challenge focuses on privilege escalation by exploiting misconfigurations in the sudo
command. You'll log in with the credentials "pentesterlab" and use sudo -l
to list authorized commands. The goal is to either read a file containing a key or gain a shell as the user "victim."
To read the file, you can specify the file's path directly on the command line using awk '{print $0}' /home/victim/key.txt
. Alternatively, to gain a shell as the user "victim," you can use awk '{system("/bin/bash")}'
. Understanding how to manipulate sudo
configurations can be crucial for ethical hacking and system auditing.