In this post, we will be continuing with Part-2 on how to escalate privileges by abusing the sudo binary / privilege. If you have not checked out Part-1 yet, I strongly suggest starting there before reading this post. In Part-2, we will shift our focus over to more advanced exploitation topics, such as: Abusing intended functionality (binaries not found […] The post Sudo Part-2 – Linux Privelege Escalation first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
I have recently got into Django and built a small project with it which is this blog. Then came the time for me to deploy the project on an unmanaged VPS, the process went fine yet with a few problems here and there due to the lack of a definitive ...| The Code Ship
Apache started sending completely gziped response when using with mod_uwsgi plugin. Post tries to find the problem cause.| Random Ramblings
Installer une seedbox avec rTorrent et rutorrent : Installation d'une seedbox multi-utilisateur from scratch {NGinx ou Apache2, HTTPS only}| Noobunbox
Let's encrypt offre la possibilité de générer des certificats ECDSA. Voici un script pour renouveler automatiquement un certificat ECDSA| Noobunbox