Get a detailed walkthrough on the Linux privileged escalation CTF brought to you by the attackdefence platform.
Get detailed writeup on vulnhub presented pylington machine. Learn how to exploit online ide application, gain an initial foothold and exploit suid, sudo and path resolution in order to get privileged shell
Learn how to exploit koken cms and get the reverse shell out of it. Perform privilege escalation by hunting for unusual SUID binaries and information from GTFOBins
In this, you will learn how to get an initial foothold through the web application and exploit sudo to get the privileged shell