Insecure File Perm
Most common
find / -writable -type d 2>/dev/null
Find the anomaly one and compare it on GTFO Bins to see which one is exploitable
Last updated
Was this helpful?
Most common
find / -writable -type d 2>/dev/null
Find the anomaly one and compare it on GTFO Bins to see which one is exploitable
Last updated
Was this helpful?