During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
AlexJacobson
Highly Voted 2 years, 11 months agoito4862
2 years, 6 months agoTrap_D0_r
1 year, 5 months agoAndre876
Highly Voted 2 years, 7 months agolionleo
Most Recent 2 weeks, 4 days agoblacksheep6r
4 months, 3 weeks ago23169fd
11 months, 3 weeks agoBiteSize
1 year, 11 months agologanharris
2 years, 1 month agomargomi86
2 years, 3 months agoFoxTrotDG
2 years, 4 months agoFoxTrotDG
2 years, 3 months agologanharris
2 years, 1 month agokycugu
2 years, 7 months agoSloananne
2 years, 9 months agobigerblue2002
2 years, 11 months agoBig_Harambe
3 years agoRevZig67
3 years, 1 month agoPongpisit
3 years, 5 months ago