#kenobi
Read more stories on Hashnode
Articles with this tag
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with pa ·...