Could you have used ssh? It might have been as easy as using nftp to upload a new /root/.ssh/authorized_keys file. Or not, depending on how they have ssh configured.
Author here. I talk a little bit about SSH in the end, if I was successful in breaking the root password and if sshd is configured for root access (I'm not sure), I could have just used that. Otherwise, for me to change authorized_keys or some other file to run some code as root, it's the same work.
mlrtime|2 years ago
https://github.com/Mr-MIBonk/M.I.B._More-Incredible-Bash
mdp2021|2 years ago
In more parts posted in distant times, the last of which (one year after that post) is -
the author (greenluigi1) made Doom work on the Hyundai (Ioniq SEL).
https://programmingwithstyle.com/posts/myhackedcarisdoomed/
https://www.youtube.com/watch?v=snKx3k5Qfm0
dn3500|2 years ago
goncalomb|2 years ago
yetanotherone24|2 years ago