linux VulnHub Escalate My Privileges Writeup In this post, you will learn about how to exploit web application PHP Bash, get initial hold via Metasploit and escalate to root privileges using cron jobs
linux VulnHub Escalate Writeup A detailed walkthrough on vulnhub's "Escalate" machine to know a misconfigured SUID bit in an unusual program can lead to multi-user privilege escalation
linux Exploiting the Cron Jobs Misconfigurations – Part 2 This is part two of exploiting the cron job where you learn about advanced misconfigurations like symlinks and paths to get the root user shell
linux Exploiting the Cron Jobs Misconfigurations – Part 1 Get practical knowledge on how to exploit cron job basic misconfiguration to get a privileged shell and execute commands on behalf of the root user.
vulnhub VulnHub PwnLab Writeup A quick walkthrough of VulnHub PwnLab machine where you will learn get through a web app and gain root user shell
linux Exploiting Sudo Misconfiguration to Get Root Shell Get in-depth knowledge of how to use sudo utility in your favor to get the root shell
linux Understand Sudo in Linux Get in detail knowledge of sudo and sudoers files. Learn how to work with sudo from an infosec point of view
linux Demystifying SUID and SGID bits Learn about SUID, SGID and Sticky bits in detail practically with programs and how to drop privileges gracefully
exploitation Exploiting SUID Binaries to Get Root User Shell Learn how you can find and exploit unusual SUID binaries to perform horizontal and then vertical privilege escalation to get a privileged shell and read the files
linux Exploiting File Permissions Misconfigurations In this post, you will learn how misconfiguration in file permission can lead to privilege escalation via practical demonstration of 2 attack defence labs
linux Understanding Linux File Permissions Get in-depth knowledge of Linux file permission from administration and infosec point of you.