Tech Articles

Useful Commands and Tools – OSCP

In previous article, we’ve shared a wide range of tools for sub-domain enumeration which helps pentesters and bug hunters collect and gather subdomains for the domain they are targeting. Enumeration is the most important thing you can do, at that inevitable stage where you find yourself hitting a wall, 90% of the time it will […]

Tutorials

Linux Privilege Escalation With Kernel Exploit – [8572.c]

In a previous tutorial, we used Metasploit Framework to gain a low-level shell through meterpreter on the target system (Metasploitable2 Machine) by exploiting the ShellShock vulnerability. But that low level shell is not root shell, it means you can’t run all system level command. To run all root or system level commands, you must escalate […]