Pentest Notes
Ctrlk
  • ๐Ÿ /home/x3m1Sec/.pt-notes
  • ๐Ÿ“Pentest Notes
  • ๐ŸŽฎCTFs
  • ๐ŸŽ“Road to certification
    • eJPTv2
    • CPTS
      • My review
      • Notes
        • Enumeration
        • Nmap
        • Attacking Common Applications
        • Attacking Common Services
        • Active Directory Enumeration & Attacks
        • Linux Privilege Escalation
          • Linux-hardening
          • Linux-priv-esc-to-quick-check-the-system
          • 2.Environment-based Privilege Escalation
            • 4.Path-abuse
            • 5.Wildcard-abuse
            • 6.Escaping-restricted-shells
          • 3.Permissions-based Privilege Escalation
          • 4.Service-based Privilege Escalation
          • 5.Linux Internals-based Privilege Escalation
          • 6.Recent 0-Days
        • Windows Privilege Escalation
        • Server-side Attacks
        • Web Attacks
        • Web Service & API Attacks
        • Command-injections
        • SQL-injection
        • XSS
        • Broken Authentication
        • Login-brute-forcing
        • Password-attacks
        • Password-cracking
        • Session Security Guide
        • File-transfer
        • File-upload-attacks
        • Shells and payloads
        • Upgrading-tty-shell
        • Using-the-metasploit-framework
        • File Inclusion
        • Ligolo-ng
        • Pivoting-tunneling-and-port-forwarding
        • TIPS
        • CheatSheet
    • OSCP
  • ๐Ÿ“šResources
Powered by GitBook
On this page
  1. ๐ŸŽ“Road to certification
  2. CPTS
  3. Notes
  4. Linux Privilege Escalation

2.Environment-based Privilege Escalation

4.Path-abuse5.Wildcard-abuse6.Escaping-restricted-shells
Previous3.Credential-huntingNext4.Path-abuse

Last updated 6 months ago