This is a dedicated watch page for a single video.
Rick, a professional hacker, was hired to retrieve sensitive information from a target organization. In this process, he used a post-exploitation tool to check common misconfigurations and find a way to escalate privileges. Which of the following tool helps Rick in escalating privileges?