Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
We use cookies to ensure that we give you the best experience on our website.
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Windows Privilege Escalation

MSSQL – Windows Privilege Escalation

In this post, we will be deep-diving into various attacks that we can use against an MSSQL server. From these attacks, we will learn how this service can be leveraged for Windows…

Read More
  • The Cyber Juggernaut
  • June 30, 2022
  • 1 Comment
  • Windows Privilege Escalation

Scheduled Tasks – Windows Privilege Escalation

For this post on Windows Privilege Escalation techniques, we will be exploring vulnerable scheduled tasks. Similar to many of the Windows privilege escalation techniques we have gone over in other posts, this…

Read More
  • The Cyber Juggernaut
  • June 23, 2022
  • Windows Privilege Escalation

Weak Service File Permissions – Windows Privilege Escalation

For this post, we will be exploring another service vulnerability that involves weak permissions; however, instead of the service itself containing weak permissions, we will find that the folder housing the service…

Read More
  • The Cyber Juggernaut
  • June 21, 2022
  • 2 Comments
  • Windows Privilege Escalation

Kernel Exploits Part 2 – Windows Privilege Escalation

For part 2 of this post we will be shifting our focus to kernel exploits for modern Windows operating systems, which include Windows versions Windows 10 and Server 2016 In part one…

Read More
  • The Cyber Juggernaut
  • June 18, 2022
  • 3 Comments
  • Windows Privilege Escalation

Kernel Exploits Part 1 – Windows Privilege Escalation

Due to the volume of information on kernel exploits I have for you guys, this post will be split into two parts. In the first part, we will be learning how to…

Read More
  • The Cyber Juggernaut
  • June 16, 2022
  • 4 Comments
  • Windows Privilege Escalation

Port Forwarding – Windows Privilege Escalation

In this post we will be exploring a Windows privilege escalation technique know as port forwarding. Port forwarding is a technique that allows an attacker to directly access internal or firewall blocked…

Read More
  • The Cyber Juggernaut
  • June 12, 2022
  • 4 Comments
  • Windows Privilege Escalation

Weak Service Permissions – Windows Privilege Escalation

In this post we will be exploring yet another technique that involves weak permissions; however, instead of a folder / file misconfiguration, this time we will be exploiting weak service permissions. We…

Read More
  • The Cyber Juggernaut
  • June 8, 2022
  • 1 Comment
  • Windows Privilege Escalation

Unquoted Service Paths – Windows Privilege Escalation

When it comes to Windows Privilege Escalation techniques, a common escalation path is to leverage misconfigured services. There are many ways that services can be misconfigured; however, by far the most interesting…

Read More
  • The Cyber Juggernaut
  • June 4, 2022
  • 1 Comment
  • Windows Privilege Escalation

Startup Applications – Windows Privilege Escalation

On Windows machines there are multiple ways to automatically start a program, which include: services, startup registry keys, and startup applications. In terms of Windows privilege escalation, most often we will find…

Read More
  • The Cyber Juggernaut
  • June 2, 2022
Prev
1 2 3 4 5 6 7
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2023 Juggernaut Pentesting Blog

Twitter LinkedIn