How to exploit a number of minor vulnerabilities to get root privileges?

How do we investigate system vulnerability to break-ins? How to obtain root privileges? Of course, by hacking into them, before a hacker does.

Maciej Grela, our chief services for IT security services uses a real-life example on how minor admin mistakes enables hijacking a large company server.

Maciej Grela
EXATEL