Unix 25

Access to videos for this exercise is only available with PentesterLab PRO
GOPRO
Unix 25
In this video, we cover the Unix 25 challenge as part of the Unix badge. We delve into the usage of the `sudo` tool to run commands as another user and demonstrate how misconfigurations in `sudo` can be exploited for privilege escalation.