0x2iRIx
search
⌘Ctrlk
inHTBTHM
0x2iRIx
  • hashtagWhoami
  • spider-webWeb pentest
  • webhookAPI pentest
  • serverNetwork pentest
    • Footprinting
    • Attacking Common Services
    • Attacking Common Applications
    • Buffer overflow [BOF]
    • Client-Side Attacks
    • Antivirus Evasion
    • Linux Privilege Escalation
      • What is Privilege Escalation?
      • Base Enumeration
      • Linux Privilege Arena & HTB
        • Kernel Exploit
        • Config File
        • History
        • Weak file permission
        • SSH
        • shell escaping
        • Abusing attended functionality
        • LD_PRELOAD
        • shared object injection
        • capability
        • crontab
        • wildcard crontab
        • PATH
        • Wildcard Abuse
        • Escaping Restricted Shells
        • Special Permissions
        • LXC / LXD
        • Docker
        • Kubernetes (K8s)
        • Shared Object Hijacking
        • Python library hijacking
        • Sudo
        • Miscellaneous Techniques (NFS)
        • Polkit
        • Dirty Pipe
        • Netfilter
      • Super Process Machine
      • Anonymous Machine
      • Checklist
      • Automated tool
    • Active Directory
    • Windows PrivEsc
  • wifiWireless pentest
  • mobileMobile Pentest
  • binaryProgramming
  • booksBooks Library
  • flagCTF
  • calendar-lines-penWriteups
  • address-bookContact me
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. serverNetwork pentestchevron-right
  2. Linux Privilege Escalation

Linux Privilege Arena & HTB

Kernel Exploitchevron-rightConfig Filechevron-rightHistorychevron-rightWeak file permissionchevron-rightSSHchevron-rightshell escapingchevron-rightAbusing attended functionalitychevron-rightLD_PRELOADchevron-rightshared object injectionchevron-rightcapabilitychevron-rightcrontabchevron-rightwildcard crontabchevron-rightPATHchevron-rightWildcard Abusechevron-rightEscaping Restricted Shellschevron-rightSpecial Permissionschevron-rightLXC / LXDchevron-rightDockerchevron-rightKubernetes (K8s)chevron-rightShared Object Hijackingchevron-rightPython library hijackingchevron-rightSudochevron-rightMiscellaneous Techniques (NFS)chevron-rightPolkitchevron-rightDirty Pipechevron-rightNetfilterchevron-right
PreviousBase Enumerationchevron-leftNextKernel Exploitchevron-right