Insecure File Perm

Most common

find / -writable -type d 2>/dev/null

Find the anomaly one and compare it on GTFO Bins to see which one is exploitable

Last updated