Insecure File Permissions
Abusing Cron Jobs
look for executed cron jobs from log, and see if the file is writable
Abusing Password Authentication
if we can write /etc/passwd we can replace the password or create new one with root permission
Last updated
Was this helpful?