A penetration tester executes the following commands:
Which of the following is a local host vulnerability that the attacker is exploiting?
A. Insecure file permissions
B. Application whitelisting
C. Shell escape
D. Writable service
References https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/#john-the-ripper—jtr