linux Vulnhub HackMePlease Walkthrough In this, you will learn how to get an initial foothold through the web application and exploit sudo to get the privileged shell
linux Understanding Concept of Shared Libraries Get in-depth knowledge of shared libraries in Linux and how it is actually used via a practical approach. Build your first library and use it in the code. In this you will also realize how dangerous LD_PRELOAD environment variable is
linux Exploiting Shared Library Misconfigurations Get the practical knowledge of Linux privilege escalation by discussing 3 pentester academy labs on shared library injection. You will realize how dangerous shared library injection is when you find GCC compiler and permission misconfiguration
linux VulnHub Escalate My Privileges Writeup In this post, you will learn about how to exploit web application PHP Bash, get initial hold via Metasploit and escalate to root privileges using cron jobs
linux VulnHub Escalate Writeup A detailed walkthrough on vulnhub's "Escalate" machine to know a misconfigured SUID bit in an unusual program can lead to multi-user privilege escalation
linux Exploiting the Cron Jobs Misconfigurations – Part 1 Get practical knowledge on how to exploit cron job basic misconfiguration to get a privileged shell and execute commands on behalf of the root user.
linux Exploiting the Cron Jobs Misconfigurations – Part 2 This is part two of exploiting the cron job where you learn about advanced misconfigurations like symlinks and paths to get the root user shell
vulnhub VulnHub PwnLab Writeup A quick walkthrough of VulnHub PwnLab machine where you will learn get through a web app and gain root user shell
linux Understand Sudo in Linux Get in detail knowledge of sudo and sudoers files. Learn how to work with sudo from an infosec point of view
linux Exploiting Sudo Misconfiguration to Get Root Shell Get in-depth knowledge of how to use sudo utility in your favor to get the root shell
exploitation Exploiting SUID Binaries to Get Root User Shell Learn how you can find and exploit unusual SUID binaries to perform horizontal and then vertical privilege escalation to get a privileged shell and read the files
linux Demystifying SUID and SGID bits Learn about SUID, SGID and Sticky bits in detail practically with programs and how to drop privileges gracefully
linux Exploiting File Permissions Misconfigurations In this post, you will learn how misconfiguration in file permission can lead to privilege escalation via practical demonstration of 2 attack defence labs
linux Understanding Linux File Permissions Get in-depth knowledge of Linux file permission from administration and infosec point of you.