Type your comment> @0x746b72 said:
Type your comment> @ExCommunicado said:
Okay I came upon an article that explains about something “DIRTY”. Got an exploit related to it but the system is not vulnerable to it. Do I need to change something in that? Or am I on the wrong track? Trying for root.
There are two versions of this well-known exploit, right? Try to read the second one thoroughly, everything you need as a “payload” is there
but does this still require snake script or am i supposed to use sc