As it has come up a few times in my personal engagements, I figured it was time to do a writeup on Oracle command execution.
Monthly Archives: May 2016
Exploiting init.d scripts based on security misconfigurations is a common, and generally easier to exploit, vector for privilege escalation. I’d like to cover an example of such an exploit this week, as well as an easy way to come across these.
Since I’m all settled back in the states, it was finally time for my new desktop assembly.