Log Analysis - Privilege Escalation
What user (other than ‘root’) is present on the server?

Answer
What script did the attacker try to download to the server?

Answer
What packet analyzer tool did the attacker try to use?

Answer
What file extension did the attacker use to bypass the file upload filter implemented by the developer?

Answer
Based on the commands run by the attacker before removing the php shell, what misconfiguration was exploited in the ‘python’ binary to gain root-level access? 1- Reverse Shell ; 2- File Upload ; 3- File Write ; 4- SUID ; 5- Library load


Answer
Last updated