linux Exploiting Linux Capabilities – Part 2 Learn about dac_read_search and dac_override capabilities and how to exploit them in different programs to get the root user access in linux
linux Understanding Linux Capabilities Get a basic understanding of what Linux capabilities are and how to use the utility tools like capsh, setcap and getcap to manage or print capabilities of program files and running processes or tasks
linux Exploiting Linux Capabilities – Part 1 Get the practical knowledge on how to abuse cap_setuid and cap_setgid capabilities in Linux to get the root user shell
linux Breaking out of CHROOT Jailed Shell Environment Learn the basics of how chroot actually works, what is different between process current working directory and root directory and how the limitation in chroot which help you break out to root file system
linux Breaking out of Restricted Shell Environment Even though a restricted shell was introduced to prevent unintended malicious activities on the system. But offensive hackers still found ways to break out of this shell and further perform privilege escalation via normal shell.
linux Exploiting Vulnerable Application for Privilege Escalation In this, you will learn how a known vulnerability in a third-party application installed on a Linux system could help attackers to escalate to root privileges
linux Pwning Webapps to Get Root Shell In this, you will learn how to exploit real-world user-facing applications to get an initial foothold and then perform privilege escalation using known vulnerabilities in web apps
linux Vulnhub HackMePlease Walkthrough In this, you will learn how to get an initial foothold through the web application and exploit sudo to get the privileged shell
linux Understanding Concept of Shared Libraries Get in-depth knowledge of shared libraries in Linux and how it is actually used via a practical approach. Build your first library and use it in the code. In this you will also realize how dangerous LD_PRELOAD environment variable is
linux Exploiting Shared Library Misconfigurations Get the practical knowledge of Linux privilege escalation by discussing 3 pentester academy labs on shared library injection. You will realize how dangerous shared library injection is when you find GCC compiler and permission misconfiguration
linux VulnHub Escalate My Privileges Writeup In this post, you will learn about how to exploit web application PHP Bash, get initial hold via Metasploit and escalate to root privileges using cron jobs
linux VulnHub Escalate Writeup A detailed walkthrough on vulnhub's "Escalate" machine to know a misconfigured SUID bit in an unusual program can lead to multi-user privilege escalation
linux Exploiting the Cron Jobs Misconfigurations – Part 1 Get practical knowledge on how to exploit cron job basic misconfiguration to get a privileged shell and execute commands on behalf of the root user.
linux Exploiting the Cron Jobs Misconfigurations – Part 2 This is part two of exploiting the cron job where you learn about advanced misconfigurations like symlinks and paths to get the root user shell
vulnhub VulnHub PwnLab Writeup A quick walkthrough of VulnHub PwnLab machine where you will learn get through a web app and gain root user shell
linux Understand Sudo in Linux Get in detail knowledge of sudo and sudoers files. Learn how to work with sudo from an infosec point of view
linux Exploiting Sudo Misconfiguration to Get Root Shell Get in-depth knowledge of how to use sudo utility in your favor to get the root shell
exploitation Exploiting SUID Binaries to Get Root User Shell Learn how you can find and exploit unusual SUID binaries to perform horizontal and then vertical privilege escalation to get a privileged shell and read the files
linux Demystifying SUID and SGID bits Learn about SUID, SGID and Sticky bits in detail practically with programs and how to drop privileges gracefully
linux Exploiting File Permissions Misconfigurations In this post, you will learn how misconfiguration in file permission can lead to privilege escalation via practical demonstration of 2 attack defence labs
linux Understanding Linux File Permissions Get in-depth knowledge of Linux file permission from administration and infosec point of you.