David Bombal cover image

#368: Hacking Linux // Linux Privilege escalation // Featuring HackerSploit

David Bombal

00:00

Pentesting - The Second Exploit

All of these exploits were originally forked from the original proof of concept exploit code. So what I did was essentially set it up for pen testers. And, you know, simply put, it provides you with an elevated, born shell session. It replaces the root password just to the point where it can execute a shell as root. Once that is done, it then restores the original, the original password file.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app