Linux Security – Privilege Escalation: Restricted Shell
Many interactive tools provide shell support, people unaware of this, provide the tools, additional privileges. The additional privileges can be leveraged to break out of restricted environment such as Restricted bash. Try this lab exercise at https://attackdefense.pentesteracademy.com/challengedetails?cid=97
Pentester Academy is the world’s leading online cyber security education platform. We offer:
💻2000+ training lab exercises accessible via your browser: https://bit.ly/2JJoyh9
📼1500+ on-demand training videos: https://bit.ly/3ogeTOe
👨🏻🏫Live bootcamp training led by world-class instructors: https://bit.ly/3g22quu
📜Certifications and exam attempts for both aspiring and seasoned red teamers: https://bit.ly/3myXmjV
FOLLOW US ON:
Tweets by SecurityTube
https://www.linkedin.com/company/pentesteracademy
https://www.facebook.com/ST.Trainings
https://blog.pentesteracademy.com
Note: All our materials are strictly meant for educational purposes.
by Pentester Academy TV
linux web server