Post Exploitation
Now that we have a reverse shell,
sudo -l
We can look at our current privleges by looking at the sudo -l command.


Since the directory personal and the file do not exist I created them. The monitor.sh script contains the following and turned it into an executable with chmod +x command.

After setting up a listener on my machine and running the monitor.sh script, we get a connection with root!

Last updated
Was this helpful?