Cub3sec's Offensive Handbook
Ctrlk
  • 🖥️Cub3sec's Offensive Handbook
  • 🔍Enumeration
    • 📴Passive
    • 📳Active
    • 🕸️Web Application
  • 📥Initial Access
    • 🕸️Common Web Application Attacks
    • 💉SQL Injection Attacks
    • 🧍Client-Side Attacks
    • 🔑Password Attacks
    • 🐚Shells
  • ⚔️Privilege Escalation
    • 🐧Linux
      • Situational Awareness
      • Insecure File Permissions
      • Insecure System Components
        • Setuid Binaries and Capabilities
        • Abusing Sudo
        • Kernel Exploits
    • 🪟Windows
  • 🏍️Lateral Movement
    • 🐧Linux
    • 🪟Windows
  • 🖍️Reporting
    • 🖊️Report writing
  • 🚔AV Evasion
    • 💊AV Detection
    • 💉Process Memory Injection
    • Defender Bypass
  • 📂Active Directory
    • 🔍Enumeration
    • Attacking Authentication
    • Shadow Credentials
    • Targeted Kerberoasting
Powered by GitBook
On this page
  1. ⚔️Privilege Escalation
  2. 🐧Linux
  3. Insecure System Components

Abusing Sudo


LogoGTFOBinsgtfobins.github.io
GTFOBins
PreviousSetuid Binaries and CapabilitiesNextKernel Exploits

Last updated 1 year ago