Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Active Directory Hacking

AD Recon – NetBIOS (137/138/139) and SMB (445) Part-2

In this post, we will be continuing with Part-2 of NetBIOS and SMB enumeration. I highly suggest you read Part-1 before continuing with this post, as we will be continuing right where…

Read MoreAD Recon – NetBIOS (137/138/139) and SMB (445) Part-2
  • The Cyber Juggernaut
  • November 27, 2023
  • Active Directory Hacking

AD Recon – NetBIOS (137/138/139) and SMB (445) Part-1

In this two-part post on AD Recon, we will review various tools that can be used to enumerate the NetBIOS (UDP port 137/138 | TCP port 139) and SMB (TCP port 445)…

Read MoreAD Recon – NetBIOS (137/138/139) and SMB (445) Part-1
  • The Cyber Juggernaut
  • November 8, 2023
  • 1 Comment
  • Active Directory Hacking

AD Recon – MSRPC Over SMB (135/139/445)

In this post, we will look at a few tools that we can use to enumerate MSRPC over SMB through UDP port 135, as well as TCP ports 135, 139, and 445.…

Read MoreAD Recon – MSRPC Over SMB (135/139/445)
  • The Cyber Juggernaut
  • October 12, 2023
  • 2 Comments
  • Active Directory Hacking

AD Recon – MSRPC (135/539)

In this post, we will look at a few different tools that we can use to enumerate the MSRPC service running on TCP/UDP port 135. We will start with a brief introduction…

Read MoreAD Recon – MSRPC (135/539)
  • The Cyber Juggernaut
  • October 6, 2023
  • 1 Comment
  • Active Directory, Walkthroughs

HackTheBox – Cascade

In this Walkthrough, we will be hacking the machine Cascade from HackTheBox. To begin, we will quickly find that we are able to dump information from LDAP using an anonymous session. During…

Read MoreHackTheBox – Cascade
  • The Cyber Juggernaut
  • July 19, 2023
  • Linux Privilege Escalation

Linux File Transfers for Hackers

In this post, we will go over various techniques that allow us to perform file transfers from our attacker machine onto a victim Linux host (download), as well as from a victim…

Read MoreLinux File Transfers for Hackers
  • The Cyber Juggernaut
  • May 29, 2023
  • Linux Privilege Escalation

Sudo Part-2 – Linux Privelege Escalation

In this post, we will be continuing with Part-2 on how to escalate privileges by abusing the sudo binary / privilege. If you have not checked out Part-1 yet, I strongly suggest starting there before reading…

Read MoreSudo Part-2 – Linux Privelege Escalation
  • The Cyber Juggernaut
  • May 23, 2023
  • 1 Comment
  • Linux Privilege Escalation

Sudo Part-1 – Linux Privilege Escalation

For this two-part post on Linux Privilege Escalation techniques, we will be deep-diving into the various ways to exploit the sudo binary / privilege. This post ended up being longer than I…

Read MoreSudo Part-1 – Linux Privilege Escalation
  • The Cyber Juggernaut
  • May 15, 2023
  • 1 Comment
  • Linux Privilege Escalation

Fail2Ban – Linux Privilege Escalation

In this post, we will explore how an attacker can escalate privileges from a standard user to root by exploiting the Fail2Ban service. We will begin by learning what Fail2Ban is, how…

Read MoreFail2Ban – Linux Privilege Escalation
  • The Cyber Juggernaut
  • May 1, 2023
1 2 3 4 … 8
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2025 Juggernaut Pentesting Blog