RGROSEC
open-menu closeme
Home
About
github linkedin
  • x86 Stack-Based Windows Buffer Overflow - Pt. 2

    calendar Apr 25, 2022 · 23 min read · Buffer Overflow Windows  ·
    Share on: twitter facebook linkedin copy
    x86 Stack-Based Windows Buffer Overflow - Pt. 2

    This tutorial is part two of a two part series that focuses on binary exploitation, in particular on x86 stack-based Windows buffer overflows. The first part of the series focuses on the theory behind the topics that will be described in this tutorial, and can be found here. The information provided in this blog is …


    Read More
  • x86 Stack-Based Windows Buffer Overflow - Pt. 1

    calendar Apr 25, 2022 · 16 min read · Buffer Overflow Windows  ·
    Share on: twitter facebook linkedin copy
    x86 Stack-Based Windows Buffer Overflow - Pt. 1

    This tutorial is part one of a two part series that focuses on binary exploitation, in particular on x86 stack-based Windows buffer overflows. This part of the series focuses on the theory behind memory, processors and buffer overflows. We first take a look at some simple c programs and assembly, then dive into the …


    Read More
  • Hack The Box - Shibboleth Walkthrough

    calendar Mar 31, 2022 · 7 min read · Hack the Box Linux  ·
    Share on: twitter facebook linkedin copy
    Hack The Box - Shibboleth Walkthrough

    Today we will be taking a look at "Shibboleth" from Hack the Box. To get get a foothold onto the box we first exploit the vulnerable-by-design IPMI protocol to obtain an administrator hash for Zabbix, and crack it. Through Zabbix we can execute local commands and obtain a shell. We can then use a recent …


    Read More
  • Hack The Box - Backdoor Walkthrough

    calendar Mar 29, 2022 · 3 min read · Hack the Box Linux  ·
    Share on: twitter facebook linkedin copy
    Hack The Box - Backdoor Walkthrough

    Welcome to my walkthrough for the "Backdoor" machine from Hack The Box. Backdoor is considered to be an easy box. We get a foothold onto the box through the exploitation of a vulnerable web service running at an unusual port. We can then escalate privileges through a screen session that was still open, which …


    Read More
  • Windows Privilege Escalation Techniques

    calendar Feb 17, 2022 · 12 min read · Privilege Escalation Windows  ·
    Share on: twitter facebook linkedin copy
    Windows Privilege Escalation Techniques

    This post is based on the notes and cheatsheets I wrote while studying for the Offensive Security Certified Professional (OSCP) exam, and can be used as a brief reference while looking for basic Windows privilege escalation methods. The contents of this blog originate from the “Windows Privilege Escalation for OSCP …


    Read More
  • Linux Privilege Escalation Techniques

    calendar Feb 17, 2022 · 10 min read · Privilege Escalation Linux  ·
    Share on: twitter facebook linkedin copy
    Linux Privilege Escalation Techniques

    This post is based on the notes and cheatsheets I wrote while studying for the Offensive Security Certified Professional (OSCP) exam, and can be used as a brief reference while looking for basic Linux privilege escalation methods. The contents of this blog originate from the "Linux Privilege Escalation for OSCP …


    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • »
    • »»

Featured Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Recent Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Categories

ELASTIC 11 DETECTION-ENGINEERING 8 WALKTHROUGHS 7 LINUX 5 PERSISTENCE 5 WEB-APPLICATION-HACKING 4 MALWARE-ANALYSIS 3 BINARY-EXPLOITATION 2 PRIVILEGE-ESCALATION 2 CVE 1

Tags

LINUX 18 ELASTIC 11 DETECTION-ENGINEERING 8 HACK-THE-BOX 7 HUNTING 5 PERSISTENCE 5 OWASP 4 WEBAPP 4 WINDOWS 4 MALWARE-ANALYSIS 3 BUFFER-OVERFLOW 2 PRIVILEGE-ESCALATION 2 AUDITD 1 CVE 1
RGROSEC

Copyright 2025 RGROSEC. All Rights Reserved

to-top