In this lesson, we solve a vulnerable virtual machine called FristiLeaks in order to explore pentesting and privilege escalation techniques.