This video shows how to an RCE or a Remote Code Execution vulnerability to hack a target server, then manually search for a local exploit to escalate privileges to system. All of the above is done to hack and root he Optimum machine in hackthebox. ✳️ Checkout Dimitris's own YouTube channel 👇 https://www.youtube.com/channel/UC8XUtbJrsi6rJaGlrnN4BNA --------------------------------------------------------------- Our VIP Membership: https://zsecurity.org/vip-membership/ --------------------------------------------------------------- 🧠 My hacking courses 👇 https://zsecurity.org/courses/ --------------------------------------------------------------- Website - https://zsecurity.org/ Facebook - https://www.facebook.com/ZSecurity-1453250781458287/ Twitter - https://twitter.com/_zSecurity_ Instagram - https://www.instagram.com/zsecurity_org/ Linkedin - https://www.linkedin.com/company/zsecurity-org/ --------------------------------------------------------------- ⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️