In this article, we will shed light on some of the Linux Privilege Escalation automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses on Linux based Devices. Table of Content Introduction Privilege Escalation Vectors Getting Access to Linux Machine LinPEAS LinEnum Bashark LES: Linux Exploit Suggester LinuxPrivChecker Metasploit: […]
Window Privilege Escalation: Automated Script
In this article, we will shed light on some of the automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses to Windows OS based Devices. Table of Content Introduction Privilege Escalation Vectors Getting Access on Windows Machine WinPEAS Seatbelt SharpUp JAWS – Just Another Windows (Enum) Script PowerUp […]
Linux Privilege Escalation using Capabilities
In this article, we will discuss the mechanism of “capability” and Privilege escalation by abusing it. As we know when the system creates a work context for each user where they achieve their tasks with the privileges that are assigned to them. So, to provide some specific functionalities, it is necessary for a non-privileged user […]
Linux for Pentester: Perl Privilege Escalation
Here we are again, coming back with one of the very essential commands, i.e., “Perl”. As we know, Perl has its significance in the era of programming languages specially designed for text editing. Apart from all of this, now it is also very prominent for a variety of purposes, including Linux system administration, network programming, […]
SUDO Security Policy Bypass Vulnerability – CVE-2019-14287
After the detection of a major security vulnerability, Official released an immediate security fix to the ‘ sudo ‘ kit in the Ubuntu repositories. If you are not aware of sudo right’s power then read this post “Linux Privilege Escalation using Sudo Rights” that help you to understand more above “CVE-2019-14287” the latest vulnerability which […]
Docker Privilege Escalation
In our previous article we have discussed “Docker Installation & Configuration”but today you will learn how to escalate the root shell if docker is running on the hots machine or I should say docker privilege escalation to spawn root shell. While we know that there is an issue with the docker that all the commands […]
Lxd Privilege Escalation
In this post, we are going to describe how an account on the system that is a member of the lxd group is able to escalate the root privilege by exploiting the features of LXD. A member of the local “lxd” group can instantly escalate the privileges to root on the host operating system. This […]
Privilege Escalation Cheatsheet (Vulnhub)
This cheatsheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples. It is not a cheatsheet for Enumeration using Linux Commands. Privilege escalation is all about proper enumeration. There are multiple ways to perform the same tasks. We have performed and compiled this list on […]
Linux For Pentester: socat Privilege Escalation
Welcome back, to grab knowledge of another command from “Linux for pentester” series. As we know there are many tools that can help the user to transfer data. Similarly, we are going to take advantage of another command i.e. “socat” which is a utility for data transfer between two addresses. So, now we will take […]
Linux for Pentester: scp Privilege Escalation
In this article, we are going to introduce another most helpful Linux command i.e. “scp” which is an abbreviated form of “secure copy”. The SCP command allows secure transferring of files between the local host and the remote host or between two remote hosts. So after knowing this fact we will check now how we […]