M10L2: Linux- SUID binaries – Part 2

It is always exciting to gain access to a system, however, where does one proceed from there? Root or bust. Unquestionably, compromised hosts are a good way of running botnets, or doing some other evil and unexciting things - but as hackers, what we need most is the root. Similarly, we need to take the [...]