joey-world Posted April 16, 2014 Share Posted April 16, 2014 Here is the deal I was testing what would happen if someone was able to get into one of the regular user accounts through ssh on a "server" in fedora. To make the test more realisticly I created an apache server, with php, sqlite, ssh server, ftp server, and so on. I was able to exploit the ssh server. I am in a low privileged user and all I have is a shell. How can I continue forward with the attack since I am a regular user? maybe there is something I can upload to the ftp and come back with an escalated shell? Thank you Best regards Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.