Windows Password ScoutingJust like Linux, Windows has several locations where users or programs store passwords by default. We can search the system for passwords…May 20, 2021May 20, 2021
A Note On Config FilesConfiguration files contain configurations for various processes and programs running on the Linux system. They are generally stored under…May 20, 2021May 20, 2021
Unique Priv-Esc MethodsI will be adding to this post occasionally, but the purpose of this post is to cover one-off privilege escalation methods found in the wild…May 18, 2021May 18, 2021
MySql to System RootMySql is a widely used open-source database. As we all know, a database is used to store large amounts of relational data. Databases also…May 18, 2021May 18, 2021
Misconfigured SSH KeysSSH is a protocol that allows users to securely manage a system remotely. It is widely used because of its ease of use and built-it…May 18, 2021May 18, 2021
Exploiting Startup ScriptsStartups scripts are scripts that are executed at boot time. Linux startup scripts are generally located in /etc/init.d but this location…May 17, 2021May 17, 2021
Password Hunting Part 2This is a continuation of my previous post on searching for passwords on the system. The following post will dive into pulling passwords…May 17, 2021May 17, 2021
Password Hunting Part 1There are multiple locations we can search for passwords (hashed and clear-text) on a Linux machine. These passwords can be used for…May 17, 2021May 17, 2021
RunAsWindows includes a useful command called RunAs that enables a user to run a program as a different user if credentials are known. This is…May 15, 2021May 15, 2021