Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Linux Privilege Escalation

SUID | SGID Part-2 – Linux Privilege Escalation

In this post, we will be continuing with the second part of the two-part post on escalating privileges by abusing SUID and SGID permissions. If you have not checked out Part-1 yet,…

Read MoreSUID | SGID Part-2 – Linux Privilege Escalation
  • The Cyber Juggernaut
  • April 13, 2023
  • 1 Comment
  • Linux Privilege Escalation

SUID | SGID Part-1 – Linux Privilege Escalation

For this two-part post on Linux Privilege Escalation, we will be exploring how to abuse binaries that have either the SUID and/or SGID bit turned on. This post ended up being a…

Read MoreSUID | SGID Part-1 – Linux Privilege Escalation
  • The Cyber Juggernaut
  • April 9, 2023
  • 1 Comment
  • Linux Privilege Escalation

Cron Jobs – Linux Privilege Escalation

In this post, we will be deep diving into cron jobs and how they can be exploited to escalate our privileges from a standard user to root. We will start by learning…

Read MoreCron Jobs – Linux Privilege Escalation
  • The Cyber Juggernaut
  • April 1, 2023
  • Linux Privilege Escalation

Docker Breakout – Linux Privilege Escalation

For this post, we will explore escalating privileges on a target Linux host by using Docker breakout techniques. We will review three different docker breakout scenarios. In each scenario, we will see…

Read MoreDocker Breakout – Linux Privilege Escalation
  • The Cyber Juggernaut
  • March 25, 2023
  • Linux Privilege Escalation

Manual Enumeration – Linux Privilege Escalation

In this post, we will be exploring manual enumeration techniques that can be used to get a “lay of the land” on a target host once a foothold has been established. Manual…

Read MoreManual Enumeration – Linux Privilege Escalation
  • The Cyber Juggernaut
  • March 18, 2023
  • 2 Comments
  • Active Directory, Walkthroughs

HacktheBox – Monteverde

In this Walkthrough, we will be hacking the machine Monteverde from HackTheBox. To begin, we will preform domain specific enumeration, which leads to the discovery that we can dump a lot of…

Read MoreHacktheBox – Monteverde
  • The Cyber Juggernaut
  • March 15, 2023
  • Active Directory, Walkthroughs

HackTheBox – Sauna

In this Walkthrough, we will be hacking the machine Sauna from HackTheBox. We will start with some domain specific enumeration with no credentials, hunting for anonymous access. An anonymous LDAP search will…

Read MoreHackTheBox – Sauna
  • The Cyber Juggernaut
  • March 13, 2023
  • Active Directory, Walkthroughs

HacktheBox – Forest

In this Walkthrough, we will be hacking the machine Forest from HackTheBox. We will start with some domain specific enumeration with no credentials, hunting for anonymous access. From there, we will find…

Read MoreHacktheBox – Forest
  • The Cyber Juggernaut
  • March 10, 2023
  • Active Directory, Walkthroughs

HackTheBox – Active

In this Walkthrough, we will be hacking the machine Active from HackTheBox. To begin, we will enumerate the SMB shares and find two custom shares named Users and Replication. Inside the Replication…

Read MoreHackTheBox – Active
  • The Cyber Juggernaut
  • March 7, 2023
Prev
1 2 3 4 5 … 8
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2025 Juggernaut Pentesting Blog