3000
Last updated
Last updated
Creating a user:
Now we can find an exploit:
Now modifying the exploit:
Create a web server:
Run it:
Listener:
Using penelope instead of nc: We are chloe.
Now we can create our own run-parts:
Now we get a root shell after running /bin/bash -p