Home » How do hackers compromise or escalate their permission when all of their commands are being monitored by the server?

How do hackers compromise or escalate their permission when all of their commands are being monitored by the server?

by Reddit » Hacking
0 comment

Hello guys!

The main question is in title. Imagine you have a low-privilege user on the target server. The server most probably (like 99% sure) is monitoring every command being run by different users to identify harmful actions (like running linpeas or some scripts to check for vulnerabilities)

In that case, the attacker can’t do anything. So how do talented hackers do this?

Source: Read More

You may also like

Leave a Comment

CyberNonStop

Cybernonstop is created to bring news and knowledge through articles to visitors.

Do not forget to subscribe.

Laest News

@2021 – All Right Reserved. Designed and Developed by PenciDesign