πŸ“”
Cyber Security Notes
search
⌘Ctrlk
πŸ“”
Cyber Security Notes
  • Introduction
  • CVEs
  • Paper Reviews
  • brain-circuitLarge Language Models
  • Security Basics Notes
  • Enumeration and Initial Compromise
  • Post Exploitation
    • Shell Escape Techniques
    • Getting stable shell after compromise
    • Linux Privilege Escalation
      • Sudoers file
      • Sudoers entry - Yum
      • Wildcards - Basics
      • Wildcards - Chown
      • Wildcards - Tar
      • Linux Permissions & SUID/SGID/Sticky Bit
      • SUID - nmap
      • SUID - bash
      • SUID - man
      • NFS no_root_squash
      • SUID - pkexec
      • Capabilities
      • Bad permissions
    • Windows Privilege Escalation
    • Data Exfiltration Post Exploitation
  • Port Forwarding Cheatsheet
  • Powershell Essentials
  • Application Security
  • Linux 64-bit Assembly
  • Cloud Security
  • API Security
  • Reverse Engineering
  • CTF Challenge Learnings
  • Applied Cryptography
  • Tools for everything
  • Openssl
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Post Exploitation

Linux Privilege Escalation

Sudoers filechevron-rightSudoers entry - Yumchevron-rightWildcards - Basicschevron-rightWildcards - Chownchevron-rightWildcards - Tarchevron-rightLinux Permissions & SUID/SGID/Sticky Bitchevron-rightSUID - nmapchevron-rightSUID - bashchevron-rightSUID - manchevron-rightNFS no_root_squashchevron-rightSUID - pkexecchevron-rightCapabilitieschevron-rightBad permissionschevron-right
PreviousGetting stable shell after compromisechevron-leftNextSudoers filechevron-right

Last updated 4 years ago