TryHackMe - Linux PrivEsc - Walkthrough
Introduction Today we're going to be doing a walkthrough for the Liinux PrivEsc room hosted at https://tryhackme.com/room/linuxprivesc . For this walkthrough, we'll be using two virtual machines (VMs), a Kali Linux VM as our attacking machine, and the deployed Debian Linux client as the the victim machine. Task 1 - Deploy the Vulnerable Debian VM Press the green button here: The Debian machine should come online after a minute or two. The IP address of the machine can be found here: Of course, the actual IP address will probably be a different one from the one in the screenshot. For the examples, however, we will use the IP address of 10.10.108.118 Next, connect to the Debian machine via SSH from our Kali Linux machine: ssh user@10.10.108.118 yes Enter password: password321 Questions: Deploy the machine and login to the "user" account using SSH. No answer needed Run the "id" command. What is the result? id uid=1000(user) gid=1000(user) grou...