CTF writeups collection by TNI-Cybersec
What is the model of the system vulnerability where an attacker can manage a system at the root using a user account?