Presenting the latest Linux bomb exploit: not a fork but a malloc-based threat. Delve into the intricacies of this novel vulnerability.
-
Updated
Mar 21, 2024
Presenting the latest Linux bomb exploit: not a fork but a malloc-based threat. Delve into the intricacies of this novel vulnerability.
In this lab, acting as a penetration tester, I identified backup vulnerabilities, conducted privilege escalation tests, and evaluated system weaknesses for potential exploitation.
This repository guides users through a series of hands-on cybersecurity challenges focused on privilege escalation, log analysis, password cracking, and system exploitation.
Add a description, image, and links to the system-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the system-exploitation topic, visit your repo's landing page and select "manage topics."