RGROSEC
open-menu closeme
Home
About
github linkedin
  • Windows Privilege Escalation Techniques

    calendar Feb 17, 2022 · 12 min read · Privilege Escalation Windows  ·
    Share on: twitter facebook linkedin copy
    Windows Privilege Escalation Techniques

    This post is based on the notes and cheatsheets I wrote while studying for the Offensive Security Certified Professional (OSCP) exam, and can be used as a brief reference while looking for basic Windows privilege escalation methods. The contents of this blog originate from the “Windows Privilege Escalation for OSCP …


    Read More
  • Linux Privilege Escalation Techniques

    calendar Feb 17, 2022 · 10 min read · Privilege Escalation Linux  ·
    Share on: twitter facebook linkedin copy
    Linux Privilege Escalation Techniques

    This post is based on the notes and cheatsheets I wrote while studying for the Offensive Security Certified Professional (OSCP) exam, and can be used as a brief reference while looking for basic Linux privilege escalation methods. The contents of this blog originate from the "Linux Privilege Escalation for OSCP …


    Read More

Featured Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Recent Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Categories

ELASTIC 11 DETECTION-ENGINEERING 8 WALKTHROUGHS 7 LINUX 5 PERSISTENCE 5 WEB-APPLICATION-HACKING 4 MALWARE-ANALYSIS 3 BINARY-EXPLOITATION 2 PRIVILEGE-ESCALATION 2 CVE 1

Tags

LINUX 18 ELASTIC 11 DETECTION-ENGINEERING 8 HACK-THE-BOX 7 HUNTING 5 PERSISTENCE 5 OWASP 4 WEBAPP 4 WINDOWS 4 MALWARE-ANALYSIS 3 BUFFER-OVERFLOW 2 PRIVILEGE-ESCALATION 2 AUDITD 1 CVE 1
RGROSEC

Copyright 2025 RGROSEC. All Rights Reserved

to-top