For this recipe, we will use a vulnerable OS called Stapler. The image can be downloaded from https://www.vulnhub.com/entry/stapler-1,150/ and loaded on VirtualBox. In the previous chapter, we learned how to perform a vulnerability assessment and gain low-level or high-level access. As part of the exercise, the reader can perform penetration testing and gain a shell on the Stapler OS. We will be continuing from the point where we receive a low-privilege shell.
For this recipe, the reader needs to have a low-privilege shell on the vulnerable Stapler OS. In this scenario, we managed to get an SSH connection to one of the users by doing some information gathering and password bruting.