Most common
Last updated 1 year ago
Was this helpful?
find / -perm -u=s -type f 2>/dev/null
Find the anomaly one and compare it on GTFO Bins to see which one is exploitable