Unix 30: Exploitation

image of exercise Unix 30: Exploitation
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Unix 30: Exploitation

In this video, we cover the exploitation of the Unix 30 challenge as part of the Unix badge on PentesterLab. We demonstrate an alternative solution involving the use of `sudo`, `chmod`, and `cp` commands to escalate privileges and access restricted files.

video duration icon02:23 number of views icon630