# NOTE: These instructions only work for 64 bit Debian-based
# Linux distributions such as Ubuntu, Mint etc.

# 1. Install our official public software signing key
wget -O- https://updates.signal.org/desktop/apt/keys.asc | gpg — dearmor > signal-desktop-keyring.gpg
cat signal-desktop-keyring.gpg | sudo tee -a /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null

# 2. Add our repository to your list of repositories
echo ‘deb [arch=amd64 signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg] https://updates.signal.org/desktop/apt xenial main’ |\
sudo tee -a /etc/apt/sources.list.d/signal-xenial.list

# 3. Update your package database and install signal
sudo apt update && sudo apt install signal-desktop

reference :- https://signal.org/download/#



Baron Samedit Walkthrough.

You can access the room through this link: https://tryhackme.com/room/sudovulnssamedit

Task 1 :- Deploy!

Deployed! → No answer needed.

Task 2 :- Baron Samedit

Use the machine in your browser, or login over SSH using these credentials:
Username: tryhackme
Password: tryhackme

The command will be:
ssh tryhackme@MACHINE_IP

tryhackme@CVE-2021–3156:~$ ll
tryhackme@CVE-2021–3156:~$ cd Exploit/
tryhackme@CVE-2021–3156:~/Exploit$ make

After compiling the exploit, what is the name of the executable created (blurred in the screenshots above)? → sudo-hax-me-a-sandwich