CompSec
CompSec copied to clipboard
Lab 4: add example of privilege escalation in task 2
Showcase that vulnerable binary is root owned. Running shell with it changes user id from current user (non-root) to root