After you gain access to a Unix / Linux machine you'll want to conduct on-target recon to find vectors for privilege escalation.
Edit this page on GitHubAfter you gain access to a Unix / Linux machine you'll want to conduct on-target recon to find vectors for privilege escalation.
Edit this page on GitHub