Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Linux Privilege Escalation

NFS Share no_root_squash – Linux Privilege Escalation

In this post, we will learn how to enumerate and attack an NFS share in order to elevate our privileges from a standard user to root. We will start by enumerating open…

Read MoreNFS Share no_root_squash – Linux Privilege Escalation
  • The Cyber Juggernaut
  • November 7, 2022
  • 1 Comment
  • Linux Privilege Escalation

Port Forwarding – Linux Privilege Escalation

In this post we will be exploring a Linux privilege escalation technique know as port forwarding. Port forwarding is a technique that allows an attacker to directly access internal or firewall blocked…

Read MorePort Forwarding – Linux Privilege Escalation
  • The Cyber Juggernaut
  • November 2, 2022
  • 1 Comment
  • Linux Privilege Escalation

Capabilities – Linux Privilege Escalation

In this post, we will perform a deep-dive on how to exploit various capabilities. Specifically, we will see how six different capabilities can be leveraged by an attacker (that’s us!) to obtain…

Read MoreCapabilities – Linux Privilege Escalation
  • The Cyber Juggernaut
  • October 28, 2022
  • Linux Privilege Escalation

MySQL User Defined Functions – Linux Privilege Escalation

In this post we will learn how to elevate our privileges on a Linux target by abusing User Defined Functions (UDF) in MySQL. By discovering a few bad configuration choices and locating…

Read MoreMySQL User Defined Functions – Linux Privilege Escalation
  • The Cyber Juggernaut
  • October 12, 2022
  • 3 Comments
  • Linux Privilege Escalation

Kernel Exploits – Linux Privilege Escalation

In this post we will be exploring various kernel exploits that can be used for Linux Privilege Escalation from standard user to root. We will start by using various commands to find…

Read MoreKernel Exploits – Linux Privilege Escalation
  • The Cyber Juggernaut
  • August 25, 2022
  • 2 Comments
  • Windows Privilege Escalation

Manual Enumeration – Windows Privileged Escalation

In this post we will be exploring manual enumeration techniques that can be used to get a “lay of the land” on the target once a foothold has been established. Manual enumeration…

Read MoreManual Enumeration – Windows Privileged Escalation
  • The Cyber Juggernaut
  • August 12, 2022
  • Windows Privilege Escalation

Insecure GUI Applications – Windows Privilege Escalation

In this post we will review how Insecure GUI Applications can be abused to achieve privilege escalation on a Windows target. We will start by finding a shortcut to an application on…

Read MoreInsecure GUI Applications – Windows Privilege Escalation
  • The Cyber Juggernaut
  • August 3, 2022
  • Windows Privilege Escalation

AppLocker Bypass – Windows Privilege Escalation

In this post we will cover the topic of AppLocker Bypass, which can be considered a step towards Windows Privilege Escalation because AppLocker will stuff all of our attempts to execute any…

Read MoreAppLocker Bypass – Windows Privilege Escalation
  • The Cyber Juggernaut
  • July 28, 2022
  • Windows Privilege Escalation

WSL – Windows Privilege Escalation

In this post we will be going over Windows Subsystem for Linux (WSL) and how it can be exploited as a potential means for privilege escalation. We will obtain a foothold on…

Read MoreWSL – Windows Privilege Escalation
  • The Cyber Juggernaut
  • July 21, 2022
Prev
1 2 3 4 5 6 7 8
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2025 Juggernaut Pentesting Blog