The project includes:
- 🛠️ Mandatory Writeups (2):
- The first method follows an intended path through the machine, moving from user to user by carefully enumerating and exploiting accessible resources. The final privilege escalation is achieved by exploiting a buffer overflow in a file named exploit_me found in the last user
- Exploits the Dirty COW (CVE-0000-0000) kernel vulnerability to gain root access directly by leveraging a local privilege escalation exploit.
- ✅
writeup1.md– - ✅
writeup2.md– - ✅
bonus/writeup3.md– - ✅
bonus/writeup4.md–
The scripts folder contains all the scripts and tools used during the exploitation process.
This project documents our penetration testing process and provides educational material for cybersecurity enthusiasts aiming to improve their exploitation and privilege escalation skills.
