HackTheBox – Academy

Using an unserialized token we can open a reverse-shell on the remote machine, gain the access to the user scanning some log file and finally get the root privilege via sudo commands without password requirement.