![]() ![]() Let's assume that the target has restricted access to the internet, so we'll need to have it on our local machine first and transfer it over to the target later. When ready, we need to download Linux Exploit Suggester from GitHub. To get started, we're using Metasploitable 2 as the target and Kali Linux as our local machine. That is why privilege escalation is vital for the complete compromise of a target. Unless the system is poorly configured, standard users can't usually execute malicious code or configure the system in dramatic ways that would benefit an attacker. Privilege escalation, especially the vertical kind, is vital for the attacker because it allows them to do things an average user wouldn't be able to.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |