Unix 30: Exploitation

Return to Exercise
image of exercise Unix 30: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
Unix 30: Exploitation

In this video, we cover the exploitation of the Unix 30 challenge as part of the Unix badge on PentesterLab. We demonstrate an alternative solution involving the use of `sudo`, `chmod`, and `cp` commands to escalate privileges and access restricted files.

video duration icon02:23 number of views icon815