Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
We use cookies to ensure that we give you the best experience on our website.
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Linux Privilege Escalation

Capabilities – Linux Privilege Escalation

In this post, we will perform a deep-dive on how to exploit various capabilities. Specifically, we will see how six different capabilities can be leveraged by an attacker (that’s us!) to obtain…

Read More
  • The Cyber Juggernaut
  • October 28, 2022
  • Linux Privilege Escalation

MySQL User Defined Functions – Linux Privilege Escalation

In this post we will learn how to elevate our privileges on a Linux target by abusing User Defined Functions (UDF) in MySQL. By discovering a few bad configuration choices and locating…

Read More
  • The Cyber Juggernaut
  • October 12, 2022
  • 3 Comments
  • Linux Privilege Escalation

Kernel Exploits – Linux Privilege Escalation

In this post we will be exploring various kernel exploits that can be used for Linux Privilege Escalation from standard user to root. We will start by using various commands to find…

Read More
  • The Cyber Juggernaut
  • August 25, 2022
  • 2 Comments
  • Windows Privilege Escalation

Manual Enumeration – Windows Privileged Escalation

In this post we will be exploring manual enumeration techniques that can be used to get a “lay of the land” on the target once a foothold has been established. Manual enumeration…

Read More
  • The Cyber Juggernaut
  • August 12, 2022
  • Windows Privilege Escalation

Insecure GUI Applications – Windows Privilege Escalation

In this post we will review how Insecure GUI Applications can be abused to achieve privilege escalation on a Windows target. We will start by finding a shortcut to an application on…

Read More
  • The Cyber Juggernaut
  • August 3, 2022
  • Windows Privilege Escalation

AppLocker Bypass – Windows Privilege Escalation

In this post we will cover the topic of AppLocker Bypass, which can be considered a step towards Windows Privilege Escalation because AppLocker will stuff all of our attempts to execute any…

Read More
  • The Cyber Juggernaut
  • July 28, 2022
  • Windows Privilege Escalation

WSL – Windows Privilege Escalation

In this post we will be going over Windows Subsystem for Linux (WSL) and how it can be exploited as a potential means for privilege escalation. We will obtain a foothold on…

Read More
  • The Cyber Juggernaut
  • July 21, 2022
  • Windows Privilege Escalation

Password Hunting – Windows Privilege Escalation

In this post we will be exploring the art of password hunting on a target machine as a means to escalate privileges either horizontally or vertically. We will go over various different…

Read More
  • The Cyber Juggernaut
  • July 16, 2022
  • 1 Comment
  • Windows Privilege Escalation

DLL Hijacking – Windows Privilege Escalation

Continuing with Windows Privilege Escalation techniques, in this post we will be covering the concept of DLL Hijacking. We will be focusing on two different types of DLL hijacking, which can both…

Read More
  • The Cyber Juggernaut
  • July 8, 2022
Prev
1 2 3 4 5 6 7
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2023 Juggernaut Pentesting Blog

Twitter LinkedIn