In the previous demonstration, the first part of this walkthrough for DerpNStink vulnerable machine, we've managed to get inside the server by exploiting different services. Now, in this part, our purpose is to escalate our privileges.
So, we're going to go from a low-privileged user to root, by taking advantage of misconfigured services and leaking credentials.
What I enjoyed most about privilege escalation for DerpNStink was the fact that I needed to analyze a packet capture dump (pcap file) with wireshark to get ssh credentials for another user. I hope you enjoy this demonstration and I hope it helps you better secure the systems you manage.
Thank you provide this tutorial , I am Your 88th Viewers now 4th Likers.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit