F2 - Unix vulnerabilities
Recent or commonly-found Solaris vulnerabilities, and in particular those for which there is exploit code in the public domain. Recent or commonly-found Linux vulnerabilities, and in particular those for which there is exploit code in the public domain. Use of remote exploit code and local exploit code to gain root access to target host Common post-exploitation activities: • exfiltrate password hashes • crack password hashes • check patch levels • derive list of missing security patches • reversion to previous state
Last updated