Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
We use cookies to ensure that we give you the best experience on our website.
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Linux Privilege Escalation

Cron Jobs – Linux Privilege Escalation

In this post, we will be deep diving into cron jobs and how they can be exploited to escalate our privileges from a standard user to root. We will start by learning…

Read More
  • The Cyber Juggernaut
  • April 1, 2023
  • Linux Privilege Escalation

Docker Breakout – Linux Privilege Escalation

For this post, we will explore escalating privileges on a target Linux host by using Docker breakout techniques. We will review three different docker breakout scenarios. In each scenario, we will see…

Read More
  • The Cyber Juggernaut
  • March 25, 2023
  • Linux Privilege Escalation

Manual Enumeration – Linux Privilege Escalation

In this post, we will be exploring manual enumeration techniques that can be used to get a “lay of the land” on a target host once a foothold has been established. Manual…

Read More
  • The Cyber Juggernaut
  • March 18, 2023
  • 1 Comment
  • Active Directory, Walkthroughs

HacktheBox – Monteverde

In this Walkthrough, we will be hacking the machine Monteverde from HackTheBox. To begin, we will preform domain specific enumeration, which leads to the discovery that we can dump a lot of…

Read More
  • The Cyber Juggernaut
  • March 15, 2023
  • Active Directory, Walkthroughs

HackTheBox – Sauna

In this Walkthrough, we will be hacking the machine Sauna from HackTheBox. We will start with some domain specific enumeration with no credentials, hunting for anonymous access. An anonymous LDAP search will…

Read More
  • The Cyber Juggernaut
  • March 13, 2023
  • Active Directory, Walkthroughs

HacktheBox – Forest

In this Walkthrough, we will be hacking the machine Forest from HackTheBox. We will start with some domain specific enumeration with no credentials, hunting for anonymous access. From there, we will find…

Read More
  • The Cyber Juggernaut
  • March 10, 2023
  • Active Directory, Walkthroughs

HackTheBox – Active

In this Walkthrough, we will be hacking the machine Active from HackTheBox. To begin, we will enumerate the SMB shares and find two custom shares named Users and Replication. Inside the Replication…

Read More
  • The Cyber Juggernaut
  • March 7, 2023
  • Walkthroughs

HacktheBox – Chatterbox

In this Walkthrough, we will be hacking the machine Chatterbox from HackTheBox. We’ll begin by finding a few interesting ports open, most notably 9255 and 9256. After running multiple nmap scans, we’ll…

Read More
  • The Cyber Juggernaut
  • March 5, 2023
  • Walkthroughs

HackTheBox – Bastion

In this Walkthrough, we will be hacking the machine Bastion from HackTheBox. We will begin by finding a few interesting ports open including 22 (SSH), 445, (SMB), and 5985 (WinRM). From there,…

Read More
  • The Cyber Juggernaut
  • March 4, 2023
1 2 3 4 … 7
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2023 Juggernaut Pentesting Blog

Twitter LinkedIn