Privilege Escalation 8
- Agent Sudo: Turning Weak Signals into Root
- Bounty Hacker: Turning Anonymous FTP Exposure into SSH Access and Root
- Ignite: When the App Password Becomes Root
- RootMe: Exploiting a Weak Upload Filter
- Brooklyn Nine Nine: Following Two Leads to Root
- Basic Pentesting: Web Clues, Weak Credentials, and an SSH Pivot
- Wgel CTF: From a Web-Exposed SSH Key to Root File Access
- Simple: Following the Smallest Lead to Full Compromise