Post Exploitation
Running Linenum.sh
Checking bash history
cat ~/.bash_history

Checking root running processes
ps -ef | grep root

Looking at the TMUX socket file.

We are a member of the hype group, and we have read write access to the file that tmux is using as a socket. (root left it open)
Hopping on to the tmux session
tmux -S /.devs/dev_sess

Dirty cow exploit


Last updated
Was this helpful?