In this post, we are going to describe how an account on the system that is a member of the lxd group is able to escalate the root privilege by exploiting the features of LXD. A member of the local “lxd” group can instantly escalate the privileges to root on the host operating system. This […]
Privilege Escalation Cheatsheet (Vulnhub)
This cheatsheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples. It is not a cheatsheet for Enumeration using Linux Commands. Privilege escalation is all about proper enumeration. There are multiple ways to perform the same tasks. We have performed and compiled this list on […]
Linux For Pentester: socat Privilege Escalation
Welcome back, to grab knowledge of another command from “Linux for pentester” series. As we know there are many tools that can help the user to transfer data. Similarly, we are going to take advantage of another command i.e. “socat” which is a utility for data transfer between two addresses. So, now we will take […]
Linux for Pentester: scp Privilege Escalation
In this article, we are going to introduce another most helpful Linux command i.e. “scp” which is an abbreviated form of “secure copy”. The SCP command allows secure transferring of files between the local host and the remote host or between two remote hosts. So after knowing this fact we will check now how we […]
Linux For Pentester: tmux Privilege Escalation
In this article, we are going to describe “tmux” which is also known as a terminal multiplexer. It allows multiple terminal sessions to be retrieved concurrently in a single window. It is useful for running more than one command-line program at the same time. NOTE: “The main objective of publishing the series of ‘Linux for […]
Linux for Pentester: ed Privilege Escalation
Here in this article, we will introduce a line-oriented text editor command i.e. “ed” that generates, displays, alters, and operates on text files. All ed commands operate on whole lines or ranges of lines; e.g., the “d” command deletes lines; the “m” command moves lines, “t” command copy the lines and so on, therefore, now […]
Linux for Pentester: sed Privilege Escalation
This article will take our readers through all about Stream Editor (Sed), which is one of the most prominent text-processing services on GNU/Linux. In this article, we came with the brief introductory guide to sed which supports the main concern that how sed works and how we can accomplish its supplementary practice in the operation […]
Linux for Pentester: pip Privilege Escalation
The main objective of this article is to make attentive our readers for the other most expedient command from the list of Linux for pentesters. As we know apart from copying, downloading and searching task user desires other excessive operational mission i.e. installation of packages. So in this article, we are going to make you […]
Linux for Pentester: git Privilege Escalation
In this article, we will understand a very dominant command i.e “git” which is use in version control of software development for controlling source code and helps the software developer. Here I’m using the basic commands that a git can perform to learn its advantage in our mission of privilege escalation. So by knowing this […]
Linux for Pentester: cp Privilege Escalation
In this article, we are going to grasp another very worthwhile command i.e. “cp” (copy) and will cover all the basic function of ‘cp” command that a user can use. As we know this command helps in copying the file/directories from the source to destination so, in this article we will study how we can […]