Shared Objects Hijacking
Description
Connect to the machine in SSH as level1:level1 and collect the different keys.
Compromission time
2 hours
Operating system
linux
start this virtual environnementConnect to the machine in SSH as level1:level1 and collect the different keys.
2 hours
linux
start this virtual environnement