Exploitation Attacking Vulnerable Kernel and SUID Applications Finding Exploit Code /pentest/exploits/exploitdb/searchsploit "kernel" |grep -i "root" cat /pentest/exploits/exploitdb/files.csv |grep -i privile grep -i X.X /pentest/exploits/exploitdb/files.csv |grep -i local grep -i application /pentest/exploits/exploitdb/files.csv |grep -i local Check Development Environment on Target Hosts find / -name perl* find / -name python* find / -name gcc* find / -name cc How can files be uploaded? find / -name wget find / -name nc* find / -name netcat* find / -name tftp* find / -name ftp