ouspg / CompSec

Exercises for (legacy) Computer Security course in the University of Oulu
MIT License
44 stars 110 forks source link

Lab 4: add example of privilege escalation in task 2 #11

Open Nicceboy opened 4 years ago

Nicceboy commented 4 years ago

Showcase that vulnerable binary is root owned. Running shell with it changes user id from current user (non-root) to root