Pentesting notes
search
⌘Ctrlk
Pentesting notes
  • 🏠/home/kabaneridev/.pt-notes
  • πŸ†Certification Preparation
    • βœ…CPTS - Completed
      • 🌐Infrastructure Enumeration
      • πŸ›‘οΈFirewall Evasion
      • πŸ”Vulnerability Assessment
      • πŸ“‚File Transfer Methods
      • 🐚Shells & Payloads
      • πŸ—„οΈDatabase Services
      • πŸ“Network Services
      • βš”οΈAttacking Common Services
      • πŸ”€Pivoting, Tunneling & Port Forwarding
      • 🏰Active Directory Enumeration & Attacks
      • πŸ–₯️Remote Management
      • πŸ•·οΈWeb Enumeration
      • 🌐Web Application Attacks
      • πŸ”Password Attacks & Lateral Movement
      • πŸͺŸWindows Privilege Escalation
      • 🐧Linux Privilege Escalation
        • πŸ“‹Module Overview
        • πŸ”Environment Enumeration
        • πŸ”§Services & Internals Enumeration
        • πŸ”Credential Hunting
        • πŸ›€οΈPATH Abuse
        • 🌟Wildcard Abuse
        • πŸšͺEscaping Restricted Shells
        • πŸ”Special Permissions
        • ⚑Sudo Rights Abuse
        • πŸ‘‘Privileged Groups
        • 🎭Capabilities
        • βš™οΈVulnerable Services
        • ⏰Cron Job Abuse
        • 🐳LXD Container Escape
        • πŸ‹Docker Container Escape
        • πŸ“œLogrotate Exploitation
        • πŸ”§Miscellaneous Techniques
        • πŸ“šShared Libraries
        • 🎯Shared Object Hijacking
        • 🐍Python Library Hijacking
        • 🚨Sudo CVE Exploits
        • πŸ”Polkit/Pwnkit
        • πŸ’§Dirty Pipe
        • 🌐Netfilter Kernel Exploits
        • πŸ›‘οΈLinux Hardening
      • πŸ“‹Documentation & Reporting
      • 🌐Attacking Enterprise Networks
    • πŸ“˜CWEE Preparation
    • βœ…PJPT - Completed
  • πŸ”§Core Knowledge Areas
    • πŸ”Information Gathering
    • 🐧Linux Privilege Escalation
    • πŸͺŸWindows Privilege Escalation
    • πŸ› οΈTools & Utilities
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ†Certification Preparationchevron-right
  2. βœ…CPTS - Completed

🐧Linux Privilege Escalation

πŸ“‹Module Overviewchevron-rightπŸ”Environment Enumerationchevron-rightπŸ”§Services & Internals Enumerationchevron-rightπŸ”Credential Huntingchevron-rightπŸ›€οΈPATH Abusechevron-right🌟Wildcard Abusechevron-rightπŸšͺEscaping Restricted Shellschevron-rightπŸ”Special Permissionschevron-right⚑Sudo Rights Abusechevron-rightπŸ‘‘Privileged Groupschevron-right🎭Capabilitieschevron-rightβš™οΈVulnerable Serviceschevron-right⏰Cron Job Abusechevron-right🐳LXD Container Escapechevron-rightπŸ‹Docker Container Escapechevron-rightπŸ“œLogrotate Exploitationchevron-rightπŸ”§Miscellaneous Techniqueschevron-rightπŸ“šShared Librarieschevron-right🎯Shared Object Hijackingchevron-right🐍Python Library Hijackingchevron-right🚨Sudo CVE Exploitschevron-rightπŸ”Polkit/Pwnkitchevron-rightπŸ’§Dirty Pipechevron-right🌐Netfilter Kernel Exploitschevron-rightπŸ›‘οΈLinux Hardeningchevron-right
PreviousWindows 7 Exploitationchevron-leftNextModule Overviewchevron-right

Last updated 5 months ago