Tag: OSCP Privilege Escalation

Linux for Pentester : ZIP Privilege Escalation

Today We are going to tell you that how can we perform Privilege Escalation with Zip command. As we all know that Zip is an easy platform-based file packaging and compression utilities for Unix-like systems like Linux, Windows, etc. The Zip program is used for compressing and packaging documents. Note: “The main objective of publishing […]

Linux for Pentester: APT Privilege Escalation

In this article, we’ll talk about APT (apt-get) functionality and learn how helpful the apt command is for Linux penetration testing and how we’ll progress apt to scale the greater privilege shell. Note: “The main objective of publishing the series of “Linux for pentester” is to introduce the circumstances and any kind of hurdles that […]

Multiple Ways to Bypass UAC using Metasploit

In this Post, we are shedding light on User Account Control shortly known as UAC. We will also look at how it can potentially protect you from malicious software and ignoring UAC prompt can trouble your system. Table of Content Introduction to UAC What is UAC? Working of UAC Techniques  Windows Escalate UAC Protection Bypass […]

Windows Kernel Exploit Privilege Escalation

Hello Friends!! In our previous article we had discussed “Vectors of Windows Privilege Escalation using the automated script” and today we are demonstrating the Windows privilege escalation via Kernel exploitation methodologies. For this purpose, we will utilize an in-built Metasploit module known as Local Exploit Suggester. The objective of this suggested is to just identify […]

Windows Privilege Escalation (AlwaysInstallElevated)

“AlwaysInstallElevated” is a setting in Windows policy that permits the Windows Installer packages (.msi files) to be installed with administrative privileges. This configuration can be adjusted through the Group Policy Editor (gpedit.msc). When activated, it enables any user, even those with restricted privileges, to install software with elevated rights. This option is available under both […]

Exploiting Wildcard for Privilege Escalation

In this article, we will cover “Wildcard Injection” an interesting old-school UNIX hacking technique, which is still a successful approach for Post exploitation and even many security-related folks haven’t heard of it. Here you will get surprised after perceiving some UNIX tools like ‘tar’ or ‘chown’ can lead to full system compromise. Table of Content […]

Linux Privilege Escalation by Exploiting Cronjobs

After solving several OSCP Challenges we decided to write the article on the various method used for Linux privilege escalation, that could be helpful for our readers in their penetration testing project. In this article, we will learn “Privilege Escalation by exploiting Cron Jobs” to gain root access of a remote host machine and also […]

Linux Privilege Escalation using LD_Preload

In this Post, we are going to discuss a new technique of privilege escalation by exploiting an environment variable “LD_Preload” but to practice this you must take some help from our previous article. Table of contents Introduction Shared Libraries Shared Libraries Names LD_Preload Lab setup Privilege Escalation Introduction Shared Libraries Shared libraries are libraries that […]