Skip to content

Hacking Articles

Raj Chandel’s Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Privilege Escalation

Linux Privilege Escalation: DirtyPipe (CVE 2022-0847)

Max Kellerman discovered the privilege escalation vulnerability DirtyPipe CVE 2022-0847, which is present in the Linux Kernel itself in post versions 5.8 and allows overwriting

Penetration Testing

A Detailed Guide on Wfuzz

Many tools now create an HTTP request and let users modify its contents. Similarly, fuzzing works by sending the same type of request multiple times

Penetration Testing

File Transfer Filter Bypass: Exe2Hex

Exe2hex is a tool that g0tmilk developed, and you can find it here. The tool transcribes EXE into a series of hexadecimal strings, which DEBUG.exe

Persistence

Windows Persistence: Shortcut Modification (T1547)

According to MITRE, adversaries often use Windows persistence techniques such as shortcut modification to maintain access or escalate privileges. Consequently, in this blog, we explore

Domain Escalation, Privilege Escalation, Red Teaming

Domain Escalation: PetitPotam NTLM Relay to ADCS Endpoints

Will Schroeder and Lee Christensen wrote a research paper on this technique which can be referred to here. In ESC8 technique mentioned in the research paper,

Privilege Escalation

Windows Privilege Escalation: PrintNightmare

Print Spooler has been on researcher’s radar ever since Stuxnet worm used print spooler’s privilege escalation vulnerability to spread through the network in nuclear enrichment

Privilege Escalation

Windows Privilege Escalation: SpoolFool

Introduction Oliver Lyak posted a write-up about a Windows Privilege Escalation vulnerability that persisted in Windows systems even after patching of previous vulnerabilities in Print

CTF Challenges, HackTheBox

Horizontall HackTheBox Walkthrough

Horizontall is an “easy” rated CTF Linux box on Hack The Box platform. The box covers initial compromise by exploiting Strapi RCE vulnerability and escalating

Privilege Escalation

Linux Privilege Escalation: PwnKit (CVE 2021-4034)

Team Qualys discovered a local privilege escalation vulnerability in PolicyKit’s (polkit) setuid tool pkexec, known as PwnKit (CVE 2021-4034), which allows low-level users to run

Posts pagination

Previous 1 … 14 15 16 … 155 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.