Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
-
Updated
Feb 9, 2022 - C
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
The second in a series of four machines, each pen-tested and explained.
🐛 Access your terminal from anywhere via the web.
Add a description, image, and links to the webshell topic page so that developers can more easily learn about it.
To associate your repository with the webshell topic, visit your repo's landing page and select "manage topics."