Most common
Last updated 1 year ago
Was this helpful?
find / -writable -type d 2>/dev/null
Find the anomaly one and compare it on GTFO Bins to see which one is exploitable