PinnedPrivilege Escalation Techniques Series | Focus on OSCP, CRTO, eJPT, PNPTAs cybersecurity enthusiast, one of the most important and interesting skills to master is privilege escalation. Whether you’re working on…Sep 30, 20244Sep 30, 20244
Privilege Escalation Techniques Series | Windows | General Post ExploitationHello everyone, As we have completed our Linux privilege escalation techniques, let’s now move on to Windows. I know most people believe…Jan 19Jan 19
Privilege Escalation Techniques Series | Linux | NFS misconfigI bet if you are beginner then this NFS technique to privilege escalation is something you are reading first time. But, Don’t worry. I am…Dec 31, 2024Dec 31, 2024
Privilege Escalation Techniques Series | Port forwardingIn this blog I will cover port forwarding. I won’t go deep into port forwarding from scratch. There are already multiple blogs out there…Dec 31, 2024Dec 31, 2024
Privilege Escalation Techniques Series | Process hijackingAs name suggests, we are hijacking process to get root shell. Personally, I have used this technique only one time while solving one…Dec 29, 2024Dec 29, 2024
Privilege Escalation Techniques Series | Kernel exploitsNow we are beginning with little bit complex thing: KERNEL! For who don’t know what kernel is, it’s simply a software which runs behind the…Dec 28, 2024Dec 28, 2024
Privilege Escalation Techniques Series | SSH keys, History files & configIn this blog we will go through one of the easiest method, which can be missed so easily. Searching for SSH keys or looking at history…Dec 22, 2024Dec 22, 2024
Privilege Escalation Techniques Series | Linux | Linux CapabilitiesIn this blog, we will use Capabilities to escalate our privileges. Linux capabilities are really a useful utility which user can use and it…Dec 7, 2024Dec 7, 2024
Something big coming up!!I know I promised to deliver my privilege escalation series on regular basis but I am planning something else too along with this…Oct 29, 2024Oct 29, 2024
Privilege Escalation Techniques Series | Linux | Exploiting SUID/SGIDOkay we are back with my best-loved technique! So, in this blog post, we’ll dive into how to exploit SUID and SGID files on a Linux system…Oct 10, 2024Oct 10, 2024