Post Exploitation
Checking for commands we can run as root


Identifying Hash


Privilege Escalation
First we create a bash file

On the Sammy Computer we can use wget as root and out put the contents of a file to somewhere else on the system.

Running the /root/troll command after being overwritten

Last updated
Was this helpful?