In this post, we will go over various techniques that allow us to perform file transfers from our attacker machine onto a victim Linux host (download), as well as from a victim Linux host back onto our attacker machine (upload). As hackers, we constantly find the need to drop tools onto our victim or the […] The post Linux File Transfers for Hackers first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this post, we will be continuing with Part-2 on how to escalate privileges by abusing the sudo binary / privilege. If you have not checked out Part-1 yet, I strongly suggest starting there before reading this post. In Part-2, we will shift our focus over to more advanced exploitation topics, such as: Abusing intended functionality (binaries not found […] The post Sudo Part-2 – Linux Privelege Escalation first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
For this two-part post on Linux Privilege Escalation techniques, we will be deep-diving into the various ways to exploit the sudo binary / privilege. This post ended up being longer than I had originally anticipated, so I had to split it into two parts. In Part-1, we will begin by manually enumerating sudo privileges for […] The post Sudo Part-1 – Linux Privilege Escalation first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this post, we will explore how an attacker can escalate privileges from a standard user to root by exploiting the Fail2Ban service. We will begin by learning what Fail2Ban is, how it works, and which configuration files are important for an attacker to know about. From there, we will learn about two specific conditions […] The post Fail2Ban – Linux Privilege Escalation first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this post, we will be continuing with the second part of the two-part post on escalating privileges by abusing SUID and SGID permissions.| Juggernaut Pentesting Blog - A blog to help others achieve their goals in Cyb...