In this post, we will go over various techniques that allow us to perform file transfers from our attacker machine onto a victim Linux host (download), as well as from a victim Linux host back onto our attacker machine (upload). As hackers, we constantly find the need to drop tools onto our victim or the […] The post Linux File Transfers for Hackers first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this post, we will be continuing with Part-2 on how to escalate privileges by abusing the sudo binary / privilege. If you have not checked out Part-1 yet, I strongly suggest starting there before reading this post. In Part-2, we will shift our focus over to more advanced exploitation topics, such as: Abusing intended functionality (binaries not found […] The post Sudo Part-2 – Linux Privelege Escalation first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this post, we will explore how an attacker can escalate privileges from a standard user to root by exploiting the Fail2Ban service. We will begin by learning what Fail2Ban is, how it works, and which configuration files are important for an attacker to know about. From there, we will learn about two specific conditions […] The post Fail2Ban – Linux Privilege Escalation first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog