Linux

Refer to Enumeration - Linux to find vulnerabilities

  • Usually result in exploits that just gives you and elevated shell or initiate a reverse shell with elevated priv, hence a reverse root shell

Last updated