Shared Objects Hijacking
Description
Connect to the machine in SSH as level1:level1 and collect the different keys.
Compromission time
2 hours
Operating system
linux
Connect to the machine in SSH as level1:level1 and collect the different keys.
2 hours
linux