Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Windows Privilege Escalation

Password Hunting – Windows Privilege Escalation

In this post we will be exploring the art of password hunting on a target machine as a means to escalate privileges either horizontally or vertically. We will go over various different…

Read MorePassword Hunting – Windows Privilege Escalation
  • The Cyber Juggernaut
  • July 16, 2022
  • 1 Comment
  • Windows Privilege Escalation

DLL Hijacking – Windows Privilege Escalation

Continuing with Windows Privilege Escalation techniques, in this post we will be covering the concept of DLL Hijacking. We will be focusing on two different types of DLL hijacking, which can both…

Read MoreDLL Hijacking – Windows Privilege Escalation
  • The Cyber Juggernaut
  • July 8, 2022
  • Windows Privilege Escalation

MSSQL – Windows Privilege Escalation

In this post, we will be deep-diving into various attacks that we can use against an MSSQL server. From these attacks, we will learn how this service can be leveraged for Windows…

Read MoreMSSQL – Windows Privilege Escalation
  • The Cyber Juggernaut
  • June 30, 2022
  • 1 Comment
  • Windows Privilege Escalation

Scheduled Tasks – Windows Privilege Escalation

For this post on Windows Privilege Escalation techniques, we will be exploring vulnerable scheduled tasks. Similar to many of the Windows privilege escalation techniques we have gone over in other posts, this…

Read MoreScheduled Tasks – Windows Privilege Escalation
  • The Cyber Juggernaut
  • June 23, 2022
  • 2 Comments
  • Windows Privilege Escalation

Weak Service File Permissions – Windows Privilege Escalation

For this post, we will be exploring another service vulnerability that involves weak permissions; however, instead of the service itself containing weak permissions, we will find that the folder housing the service…

Read MoreWeak Service File Permissions – Windows Privilege Escalation
  • The Cyber Juggernaut
  • June 21, 2022
  • 3 Comments
  • Windows Privilege Escalation

Kernel Exploits Part 2 – Windows Privilege Escalation

For part 2 of this post we will be shifting our focus to kernel exploits for modern Windows operating systems, which include Windows versions Windows 10 and Server 2016 In part one…

Read MoreKernel Exploits Part 2 – Windows Privilege Escalation
  • The Cyber Juggernaut
  • June 18, 2022
  • 3 Comments
  • Windows Privilege Escalation

Kernel Exploits Part 1 – Windows Privilege Escalation

Due to the volume of information on kernel exploits I have for you guys, this post will be split into two parts. In the first part, we will be learning how to…

Read MoreKernel Exploits Part 1 – Windows Privilege Escalation
  • The Cyber Juggernaut
  • June 16, 2022
  • 4 Comments
  • Windows Privilege Escalation

Port Forwarding – Windows Privilege Escalation

In this post we will be exploring a Windows privilege escalation technique know as port forwarding. Port forwarding is a technique that allows an attacker to directly access internal or firewall blocked…

Read MorePort Forwarding – Windows Privilege Escalation
  • The Cyber Juggernaut
  • June 12, 2022
  • 4 Comments
  • Windows Privilege Escalation

Weak Service Permissions – Windows Privilege Escalation

In this post we will be exploring yet another technique that involves weak permissions; however, instead of a folder / file misconfiguration, this time we will be exploiting weak service permissions. We…

Read MoreWeak Service Permissions – Windows Privilege Escalation
  • The Cyber Juggernaut
  • June 8, 2022
  • 2 Comments
Prev
1 2 3 4 5 6 7 8
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2025 Juggernaut Pentesting Blog