Linux Security – Privilege Escalation: Restricted Shell



Linux Security – Privilege Escalation: Restricted Shell

Linux Security - Privilege Escalation: Restricted Shell

Many interactive tools provide shell support, people unaware of this, provide the tools, additional privileges. The additional privileges can be leveraged to break out of restricted environment such as Restricted bash. Try this lab exercise at https://attackdefense.pentesteracademy.com/challengedetails?cid=97

Pentester Academy is the world’s leading online cyber security education platform. We offer:
💻2000+ training lab exercises accessible via your browser: https://bit.ly/2JJoyh9
📼1500+ on-demand training videos: https://bit.ly/3ogeTOe
👨🏻‍🏫Live bootcamp training led by world-class instructors: https://bit.ly/3g22quu
📜Certifications and exam attempts for both aspiring and seasoned red teamers: https://bit.ly/3myXmjV

FOLLOW US ON:
https://twitter.com/securitytube
https://www.linkedin.com/company/pentesteracademy
https://www.facebook.com/ST.Trainings
https://blog.pentesteracademy.com

Note: All our materials are strictly meant for educational purposes.