The goal of privilege escalation in windows is to gain administrator or system account access.
Different type of resources are present in windows
Permissions to access these is controlled by the ACLs
msfvenom -l payloads
Select a reverse shell payload for windows, configure…
There are various ways in which privilege escalation can be achieved in linux, I am solving the challenges from tryhackme room and will write about each one from the below list.
1. Service Exploits
2. Weak File Permissions
3. Sudo — shell escape sequences
4. Cron jobs
5. suid /…
Sudo reminds me of the naayak movie dialogue,“tumhe ek din ke liye mukhyamantri banaaya jaa sakta hai, kya kar loge”.
The hero is allowed to be chief minister for one day and he does all the damage/reform he can.
Coming back to technical world again, every user has a security…
As always, started with nmap scan
nmap output shows two ports are open, 22 and 80. To enumerate further I installed, wapaalyzer which is a tool to gather technical details of a website.
To install this on firefox
Go go about:debugging#/runtime/this-firefoxClick ‘Load Temporary Add-on’Select src/drivers/webextension/manifest.json …
Initially, buffer overflow felt like a daunting topic to me ! There is lots of stuff available on the internet. If you check it all at once, it gets overwhelming and you are more likely to give up !
What are war files ? If an application allows us to upload such a file, then can we create such a file and obtain a reverse shell through it ?
Nmap scan reveals that it’s an apache tomcat web server.
Tomcat is a web server for hosting java files.
What are the system methods in php, in how many ways can we use those system methods ? Can we modify the publicly available exploits to get code execution ?
If a CMS allows you to add code, can you add a code that will provide you a shell ?
The http protocol allows us to use methods like GET , POST, PUT, DELETE to send/delete data, however are there any methods with which we can edit, copy or manage files on a remote server ?
If such protocol/extension allows you to copy or move files, can you abuse this…