The way the attacker has escalated the privilege to root through taking advantage of the Sudo IPTables
Overview As you may know, in many Linux systems, administrators often configure sudo to grant users the ability to run specific commands without a password. One common tool given such permission is iptables, used to configure the firewall. But what h...
Jun 6, 20254 min read9



