davhojt
78016943b0
|
2 years ago | |
---|---|---|
.. | ||
audit | 2 years ago | |
README.md | 2 years ago |
README.md
Local
Guideline
In this project you will learn about Privilege escalation We will provide a VM 01-Local1.ova. You have to install it locally in VirtualBox And then found a way to go inside it and get root access. There will be no visible IP address, you must find a way to get it. You have to become root and get the flag.
-
SHA1: f3422f3364fd38e8183740f8f57fa951d3f6e0bf
-
The modification in GRUB or in the VM to get the root access is forbidden!
Advice
https://en.wikipedia.org/wiki/Privilege_escalation
Submission and audit
- Virtual box must be installed in your machine for the audit!
Files that must be inside your repository:
- a README.md file, Which explains all the steps you went through in order to reach root access.
Don’t hesitate to double check the names of your folders and files to ensure they are correct!
⚠️ These methods and tools are for educational purposes only, so that you have a better understanding of how to protect against similar vulnerabilities. You must ensure that you do not attempt any exploit-type activity without the explicit permission of the owner of the machine, system or application. Failure to obtain permission risks breaking the law.