TLDR
- Exploit the known vulnerability of the services running on the system
- You get the shell as root so no P.E required
TLDR
- Exploit Local file inclusion to get credentials from config
- Use the credentials to get into Mysql
- From MySQL get the login creds for
upload
page
- Bypass restriction and upload shell
- exploit misconfigured SUID for privilege escalation.