Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
We use cookies to ensure that we give you the best experience on our website.
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Walkthroughs

HackTheBox – Bastard

In this Walkthrough, we will be hacking the machine Bastard from HackTheBox. We will begin by finding only one interesting port open, which is port 80, and from the nmap scan, it…

Read More
  • The Cyber Juggernaut
  • March 2, 2023
  • Walkthroughs

HackTheBox – Arctic

In this Walkthrough, we will be hacking the machine Arctic from HackTheBox. We will begin by finding only one interesting port open, which is port 8500. From there, we’ll enumerate the service…

Read More
  • The Cyber Juggernaut
  • February 28, 2023
  • Active Directory, Walkthroughs

HackTheBox – Mantis

In this Walkthrough, we will be hacking the machine Mantis from HackTheBox. We will begin by enumerating domain / domain controller specific services, which allows us to find a valid username. Next,…

Read More
  • The Cyber Juggernaut
  • February 26, 2023
  • Active Directory Hacking

Lateral Movement – Token Impersonation

In this post we will review how to perform a token impersonation attack using access tokens that were left laying around on a Windows 10 host after a domain admin had logged…

Read More
  • The Cyber Juggernaut
  • February 24, 2023
  • Linux Privilege Escalation

Weak File Permissions – Linux Privilege Escalation

For this post, we will review how to look for common files that should be locked-down by default, but have been made overly permissive with weak file permissions. Additionally, we will look…

Read More
  • The Cyber Juggernaut
  • December 23, 2022
  • 1 Comment
  • Linux Privilege Escalation

Password Hunting – Linux Privilege Escalation

In this post we will be exploring the art of password hunting on a target Linux machine as a means to escalate privileges either horizontally or vertically. We will review various techniques…

Read More
  • The Cyber Juggernaut
  • December 1, 2022
  • 2 Comments
  • Linux Privilege Escalation

LXD Container – Linux Privilege Escalation

In this post we are going to review the LXD group permissions on a Linux target and learn how a member of this group can elevate privileges from a standard user to…

Read More
  • The Cyber Juggernaut
  • November 14, 2022
  • 2 Comments
  • Linux Privilege Escalation

NFS Share no_root_squash – Linux Privilege Escalation

In this post, we will learn how to enumerate and attack an NFS share in order to elevate our privileges from a standard user to root. We will start by enumerating open…

Read More
  • The Cyber Juggernaut
  • November 7, 2022
  • 1 Comment
  • Linux Privilege Escalation

Port Forwarding – Linux Privilege Escalation

In this post we will be exploring a Linux privilege escalation technique know as port forwarding. Port forwarding is a technique that allows an attacker to directly access internal or firewall blocked…

Read More
  • The Cyber Juggernaut
  • November 2, 2022
  • 1 Comment
Prev
1 2 3 4 5 … 7
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2023 Juggernaut Pentesting Blog

Twitter LinkedIn