Re: how an hacker can bypass a chrooted environement ? From: Peter Kosinar <goober () ksp sk> Date: Fri, 12 May 2006 20:45:27 +0200 (CEST) Hello, I was wondering how an attacker can bypass a chrooted environement. A (common) technique consist in finding a vulnerable program (in the chrooted environnement) and injecting it a shellcode (i.e ../../../../../../../bin/bash for ex.) by BoF. But normally
![Penetration Testing: Re: how an hacker can bypass a chrooted environement ?](https://cdn-ak-scissors.b.st-hatena.com/image/square/79979c6abe6ca12ab120b440fa6dcb22c44798a6/height=288;version=1;width=512/https%3A%2F%2Fseclists.org%2Fimages%2Fpen-test-img.png)