Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Walkthroughs

HacktheBox – Chatterbox

In this Walkthrough, we will be hacking the machine Chatterbox from HackTheBox. We’ll begin by finding a few interesting ports open, most notably 9255 and 9256. After running multiple nmap scans, we’ll…

Read MoreHacktheBox – Chatterbox
  • The Cyber Juggernaut
  • March 5, 2023
  • Walkthroughs

HackTheBox – Bastion

In this Walkthrough, we will be hacking the machine Bastion from HackTheBox. We will begin by finding a few interesting ports open including 22 (SSH), 445, (SMB), and 5985 (WinRM). From there,…

Read MoreHackTheBox – Bastion
  • The Cyber Juggernaut
  • March 4, 2023
  • Walkthroughs

HackTheBox – Bastard

In this Walkthrough, we will be hacking the machine Bastard from HackTheBox. We will begin by finding only one interesting port open, which is port 80, and from the nmap scan, it…

Read MoreHackTheBox – Bastard
  • The Cyber Juggernaut
  • March 2, 2023
  • Walkthroughs

HackTheBox – Arctic

In this Walkthrough, we will be hacking the machine Arctic from HackTheBox. We will begin by finding only one interesting port open, which is port 8500. From there, we’ll enumerate the service…

Read MoreHackTheBox – Arctic
  • The Cyber Juggernaut
  • February 28, 2023
  • Active Directory, Walkthroughs

HackTheBox – Mantis

In this Walkthrough, we will be hacking the machine Mantis from HackTheBox. We will begin by enumerating domain / domain controller specific services, which allows us to find a valid username. Next,…

Read MoreHackTheBox – Mantis
  • The Cyber Juggernaut
  • February 26, 2023
  • Active Directory Hacking

Lateral Movement – Token Impersonation

In this post we will review how to perform a token impersonation attack using access tokens that were left laying around on a Windows 10 host after a domain admin had logged…

Read MoreLateral Movement – Token Impersonation
  • The Cyber Juggernaut
  • February 24, 2023
  • Linux Privilege Escalation

Weak File Permissions – Linux Privilege Escalation

For this post, we will review how to look for common files that should be locked-down by default, but have been made overly permissive with weak file permissions. Additionally, we will look…

Read MoreWeak File Permissions – Linux Privilege Escalation
  • The Cyber Juggernaut
  • December 23, 2022
  • 3 Comments
  • Linux Privilege Escalation

Password Hunting – Linux Privilege Escalation

In this post we will be exploring the art of password hunting on a target Linux machine as a means to escalate privileges either horizontally or vertically. We will review various techniques…

Read MorePassword Hunting – Linux Privilege Escalation
  • The Cyber Juggernaut
  • December 1, 2022
  • 4 Comments
  • Linux Privilege Escalation

LXD Container – Linux Privilege Escalation

In this post we are going to review the LXD group permissions on a Linux target and learn how a member of this group can elevate privileges from a standard user to…

Read MoreLXD Container – Linux Privilege Escalation
  • The Cyber Juggernaut
  • November 14, 2022
  • 2 Comments
Prev
1 2 3 4 5 6 … 8
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2025 Juggernaut Pentesting Blog