๐Linux PrivEsc
Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available. Credentials: user:password321
Last updated
Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available. Credentials: user:password321
Last updated
Room Attributes | Value |
---|---|
No answer needed
No answer needed
HINT: john the ripper should automatically identify it when cracking!
No answer needed
HINT: Play around with certain options the program has!
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
uid=1000(user) gid=1000(user) groups=1000(user),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev)
$6$Tb/euwmK$OXA.dwMeOAcopwBl68boTG5zi65wIHsc84OWAIye5VITLLtVlaXvRDJXET..it8r.jbrlpfZeMdwD3B0fGxJI0
sha512crypt
password123
uid=0(root) gid=0(root) groups=0(root)
11
apache2
/home/user:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
mysql -h somehost.local -uroot -ppassword123
/etc/openvpn/auth.txt
no_root_squash
Subscription Required
False [Free]
Type
Walkthroughs
Difficulty
Medium
Tags
PrivEsc, Privilege Escalation, Linux, Linux Privilege Escalation