Privilege Escalation through Passwords in Windows
Techniques for escalating privileges in Windows through passwords stored in the registry, configuration files, saved credentials, and SAM hash extraction.
127 articles
Techniques for escalating privileges in Windows through passwords stored in the registry, configuration files, saved credentials, and SAM hash extraction.
Learn to identify and exploit misconfigured graphical applications in Windows to escalate privileges using GUI exploitation techniques.
Learn what Windows services are, how they work, the different types of privilege escalation related to services, and enumeration techniques with accesschk.exe.
Learn to identify and exploit Windows services with unquoted paths to escalate privileges using Unquoted Service Path techniques.
Complete review of INE Security's eCPPTv2 certification: advanced pentesting course, complex labs, pivoting exam, and my experience obtaining the certification.
Learn to escalate privileges on Windows through kernel exploits, vulnerability enumeration, and tools like WESNG and Watson.
Manual exploitation of Buffer Overflow in SLMail 5.5, from fuzzing to obtaining a reverse shell, controlling the EIP and avoiding badchars.
Explanation of Path Hijacking and Library Hijacking privilege escalation techniques on Linux, how to exploit them through PATH manipulation, and practical examples with SUID permissions and sudo.
Practical guide to configure a Linux system as a router using IP Forwarding and static routes with ip route
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏