Security challenge. The goal is to become root on the machine by exploiting the server's vulnerabilities.
We are not supposed to exploit the ISO
file itself
As requested by the subject, we need to provide two solutions to the challenge.
The first writeup is the solution expected by the subject. It's more of a CTF style solution than a real life scenario.
You can find the writeup at here
The second writeup is a more realistic solution. It's utalizing a race condition in the kernel to gain root access.
You can find the writeup at here
You will find all specific information about how I solved the different challenges within the writeups file. Any basic information is not provided as you can easily find it on the internet.
Assxios (droge) |