Lobsters
- Privilege Escalation in Ubuntu Linux (dirty_sock exploit) https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html 2 comments linux , security
- New Ubuntu Linux privilege escalation exploit and technical write-up (dirty_sock) https://shenaniganslabs.io/2019/02/13/dirty-sock.html 11 comments linux
- Privilege Escalation in Ubuntu Linux (dirty_sock exploit) https://shenaniganslabs.io/2019/02/13/dirty-sock.html 18 comments golang
- New Ubuntu Linux privilege escalation exploit and technical write-up (dirty_sock) https://shenaniganslabs.io/2019/02/13/dirty-sock.html 28 comments netsec
Linking pages
Linked pages
- GitHub - snapcore/snapd: The snapd and snap tools enable systems to work with .snap files. https://github.com/snapcore/snapd 97 comments
- Log in https://login.ubuntu.com 11 comments
- Install Linux apps using the Snap Store | Snapcraft https://snapcraft.io/store 0 comments
- GitHub - initstring/dirty_sock: Linux privilege escalation exploit via snapd (CVE-2019-7304) https://github.com/initstring/dirty_sock 0 comments
Related searches:
Search whole site: site:shenaniganslabs.io
Search title: Privilege Escalation in Ubuntu Linux (dirty_sock exploit) | Shenanigans Labs
See how to search.