Enumeration

Exploits

Cron jobs

We find the user_backups.sh file is writable and located in the current user's home directory and is scheduled to be run as root every minute.

Insecure /etc/passwd permissions

SUID binaries

The find program is vulnerable

Capabilities

Sudo

apt-get can be run as sudo

Kernel Vulnerabilities

We choose a newer exploit 'linux/local/45010.c'

Miscellaneous