Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges…
A blog about IT, security and whatever crosses my mind
Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges…