linux Exploiting Sudo Misconfiguration to Get Root Shell Get in-depth knowledge of how to use sudo utility in your favor to get the root shell
exploitation Exploiting SUID Binaries to Get Root User Shell Learn how you can find and exploit unusual SUID binaries to perform horizontal and then vertical privilege escalation to get a privileged shell and read the files
linux Exploiting File Permissions Misconfigurations In this post, you will learn how misconfiguration in file permission can lead to privilege escalation via practical demonstration of 2 attack defence labs
linux Understanding Linux File Permissions Get in-depth knowledge of Linux file permission from administration and infosec point of you.