Tag: OSCP Privilege Escalation

Linux Privilege Escalation: Automated Script

In this article, we will shed light on some of the Linux Privilege Escalation automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses on Linux based Devices. Table of Content Introduction Privilege Escalation Vectors Getting Access to Linux Machine LinPEAS LinEnum Bashark LES: Linux Exploit Suggester LinuxPrivChecker Metasploit: […]

Window Privilege Escalation: Automated Script

In this article, we will shed light on some of the automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses to Windows OS based Devices. Table of Content Introduction Privilege Escalation Vectors Getting Access on Windows Machine WinPEAS Seatbelt SharpUp JAWS – Just Another Windows (Enum) Script PowerUp […]

Linux Privilege Escalation using Capabilities

In this article, we will discuss the mechanism of “capability” and Privilege escalation by abusing it. As we know when the system creates a work context for each user where they achieve their tasks with the privileges that are assigned to them. So, to provide some specific functionalities, it is necessary for a non-privileged user […]

Linux for Pentester: Perl Privilege Escalation

Here we are again, coming back with one of the very essential commands, i.e., “Perl”. As we know, Perl has its significance in the era of programming languages specially designed for text editing. Apart from all of this, now it is also very prominent for a variety of purposes, including Linux system administration, network programming, […]

SUDO Security Policy Bypass Vulnerability – CVE-2019-14287

After the detection of a major security vulnerability, Official released an immediate security fix to the ‘ sudo ‘ kit in the Ubuntu repositories. If you are not aware of sudo right’s power then read this post “Linux Privilege Escalation using Sudo Rights” that help you to understand more above “CVE-2019-14287” the latest vulnerability which […]

Docker Privilege Escalation

In our previous article we have discussed “Docker Installation & Configuration”but today you will learn how to escalate the root shell if docker is running on the hots machine or I should say docker privilege escalation to spawn root shell. While we know that there is an issue with the docker that all the commands […]

Privilege Escalation Cheatsheet (Vulnhub)

This cheatsheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples. It is not a cheatsheet for Enumeration using Linux Commands. Privilege escalation is all about proper enumeration. There are multiple ways to perform the same tasks. We have performed and compiled this list on […]