During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
AlexJacobson
Highly Voted 2 years, 9 months agoito4862
2 years, 4 months agoTrap_D0_r
1 year, 3 months agoAndre876
Highly Voted 2 years, 5 months agoblacksheep6r
Most Recent 2 months, 2 weeks ago23169fd
9 months, 2 weeks agoBiteSize
1 year, 9 months agologanharris
1 year, 11 months agomargomi86
2 years agoFoxTrotDG
2 years, 2 months agoFoxTrotDG
2 years agologanharris
1 year, 11 months agokycugu
2 years, 4 months agoSloananne
2 years, 7 months agobigerblue2002
2 years, 9 months agoBig_Harambe
2 years, 10 months agoRevZig67
2 years, 11 months agoPongpisit
3 years, 3 months ago