⌨️
Penetration testing & ethical hacking concepts
Ctrl
K
Copy
Methodology
Post exploitation/Privilege escalation
1
User privileges
id
, sudo, etc.
2
SUID/SGID bit
3
File permissions
4
Environment variables
5
Cronjobs
6
Kernel exploit
7
Automated tools
winpeas, linpeas, etc.
Previous
Initial access/Exploitation
Next
What are attacks on routing protocols?
Last updated
1 day ago