For this two-part post on Linux Privilege Escalation techniques, we will be deep-diving into the various ways to exploit the sudo binary / privilege. This post ended up being longer than I had originally anticipated, so I had to split it into two parts. In Part-1, we will begin by manually enumerating sudo privileges for […] The post Sudo Part-1 – Linux Privilege Escalation first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this post, we will be continuing with the second part of the two-part post on escalating privileges by abusing SUID and SGID permissions.| Juggernaut Pentesting Blog - A blog to help others achieve their goals in Cyb...