I wrote a blog post for the HackTheBox blog on how to exploit the Looney Tunables CVE on the TwoMillion machine. I'll give an overview of the exploit, show how to run it, and how to identify it in logs:
I wrote a blog post for the HackTheBox blog on how to exploit the Looney Tunables CVE on the TwoMillion machine. I'll give an overview of the exploit, show how to run it, and how to identify it in logs: