This machine has some type of IDS shooting down most reverse shell techniques. I can tell you this much - if you’re stuck at this point, Root is going to make you want to shoot yourself in the face.
Hi, I’ve got a Lowpriv shell on that box, I understood that BufferOverFlow seems to be the right direction to follow and it’s seems that I know where to find the vulnerable application but I can’t progress to impersonate the boss… ( I tried to follow a lead with audio steganography (without success) and got a hash too without being able to crack it)