CompSec
CompSec copied to clipboard
Exercises for (legacy) Computer Security course in the University of Oulu
Results
11
CompSec issues
Sort by
recently updated
recently updated
newest added
Showcase that vulnerable binary is root owned. Running shell with it changes user id from current user (non-root) to root