Post Exploitation
Now that we have a reverse shell,
Last updated
Was this helpful?
Now that we have a reverse shell,
Last updated
Was this helpful?
Was this helpful?
sudo -l
We can look at our current privleges by looking at the sudo -l command.
Since the directory personal and the file do not exist I created them. The monitor.sh script contains the following and turned it into an executable with chmod +x command.
After setting up a listener on my machine and running the monitor.sh script, we get a connection with root!