You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

30 lines
1.3 KiB

# Local
### Guideline
In this project you will learn about Privilege escalation We will provide a VM 01-Local1.ova.
You have to install it locally in VirtualBox And then found a way to go inside it and get root access.
There will be no visible IP address, you must find a way to get it.
You have to become root and get the flag.
- [01-Local1.ova](https://assets.01-edu.org/cybersecurity/localI/01-Local1.ova)
- SHA1: f3422f3364fd38e8183740f8f57fa951d3f6e0bf
- The modification in GRUB or in the VM to get the root access is forbidden!
### Advice
https://en.wikipedia.org/wiki/Privilege_escalation
### Submission and audit
- Virtual box must be installed in your machine for the audit!
Files that must be inside your repository:
- a README.md file, Which explains all the steps you went through in order to reach root access.
Don’t hesitate to double check the names of your folders and files to ensure they are correct!
> These methods and tools are for educational purposes only, so that you have a better understanding of how to protect against similar vulnerabilities. You must ensure that you do not attempt any exploit-type activity without the explicit permission of the owner of the machine, system or application. Failure to obtain permission risks breaking the law.