Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
reverse-engineering buffer-overflow-attack infosec webshell dirtycow suexec privilege-escalation-exploits ret2libc arbitrary-code-execution shellcode-injection nop-slides
-
Updated
Feb 9, 2022 - C